Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Honeywell Experion PKS Safety Manager 5.02 uses Hard-coded Credentials. According to FSCT-2022-0052, there is a Honeywell Experion PKS Safety Manager hardcoded credentials issue. The affected components are characterized as: POLO bootloader. The potential impact is: Manipulate firmware. The Honeywell Experion PKS Safety Manager utilizes the DCOM-232/485 serial interface for firmware management purposes. When booting, the Safety Manager exposes the Enea POLO bootloader via this interface. Access to the boot configuration is controlled by means of credentials hardcoded in the Safety Manager firmware. The credentials for the bootloader are hardcoded in the firmware. An attacker with access to the serial interface (either through physical access, a compromised EWS or an exposed serial-to-ethernet gateway) can utilize these credentials to control the boot process and manipulate the unauthenticated firmware image (see FSCT-2022-0054).
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Honeywell Safety Manager 信任管理问题漏洞
Vulnerability Description
Honeywell Safety Manager是美国霍尼韦尔(Honeywell)公司的用于最大限度地减少事故、最大限度地延长生产正常运行时间、降低合规成本并管理工厂安全。 Honeywell Safety Manager R160.1之前版本存在信任管理问题漏洞,该漏洞源于对引导配置的访问由安全管理器固件中硬编码的凭据控制,攻击者利用该漏洞能够控制启动过程并操纵固件映像。
CVSS Information
N/A
Vulnerability Type
N/A