C300 information leak due to an analysis feature which allows extracting more memory over the network than required by the function. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://process.honeywell.com |
![]() ![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: Honeywell
Published:
Updated: 2024-08-02T07:59:44.280Z
Reserved: 2023-10-04T17:50:45.390Z
Link: CVE-2023-5392

Updated: 2024-08-02T07:59:44.280Z

Status : Awaiting Analysis
Published: 2024-04-11T20:15:09.800
Modified: 2024-11-21T08:41:40.830
Link: CVE-2023-5392

No data.