CVE-2019-18228 (GCVE-0-2019-18228)

Vulnerability from cvelistv5 – Published: 2019-10-31 21:09 – Updated: 2024-08-05 01:47
VLAI?
Summary
Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affected products where a specially crafted HTTP packet request could result in a denial of service.
Severity ?
No CVSS data available.
CWE
  • CWE-20 - IMPROPER INPUT VALIDATION CWE-20
Assigner
References
Impacted products
Vendor Product Version
n/a Honeywell equIP series IP cameras Affected: H4L2GR1 prior to 2.420.HW01.33.20190812, HBL2GR1 prior to 2.420.HW01.33.20190812, HCL2G prior to 2.420.HW01.33.20190812, H4W2GR1 prior to 1.000.HW00.21.20190812, H4W2GR2 prior to 1.000.HW00.21.20190812, H4W4GR1 prior to 1.000.HW00.21.20190812, H3W2GR1 prior to 1.000.HW00.21.20190812, H3W2GR2 prior to 1.000.HW00.21.20190812, H3W4GR1 prior to 1.000.HW00.21.20190812, HBW2GR1 prior to 1.000.HW00.21.20190812, HBW4GR1 prior to 1.000.HW00.21.20190812, HBW2GR3 prior to 1.000.HW00.21.20190812, HCW2G prior to 1.000.HW00.21.20190812, HCW4G prior to 1.000.HW00.21.20190812
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:47:14.023Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Honeywell equIP series IP cameras",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "H4L2GR1 prior to 2.420.HW01.33.20190812, HBL2GR1 prior to 2.420.HW01.33.20190812, HCL2G prior to 2.420.HW01.33.20190812, H4W2GR1 prior to 1.000.HW00.21.20190812, H4W2GR2 prior to 1.000.HW00.21.20190812, H4W4GR1 prior to 1.000.HW00.21.20190812, H3W2GR1 prior to 1.000.HW00.21.20190812, H3W2GR2 prior to 1.000.HW00.21.20190812, H3W4GR1 prior to 1.000.HW00.21.20190812, HBW2GR1 prior to 1.000.HW00.21.20190812, HBW4GR1 prior to 1.000.HW00.21.20190812, HBW2GR3 prior to 1.000.HW00.21.20190812, HCW2G prior to 1.000.HW00.21.20190812, HCW4G prior to 1.000.HW00.21.20190812"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affected products where a specially crafted HTTP packet request could result in a denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "IMPROPER INPUT VALIDATION CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-31T21:09:16",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2019-18228",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Honeywell equIP series IP cameras",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "H4L2GR1 prior to 2.420.HW01.33.20190812, HBL2GR1 prior to 2.420.HW01.33.20190812, HCL2G prior to 2.420.HW01.33.20190812, H4W2GR1 prior to 1.000.HW00.21.20190812, H4W2GR2 prior to 1.000.HW00.21.20190812, H4W4GR1 prior to 1.000.HW00.21.20190812, H3W2GR1 prior to 1.000.HW00.21.20190812, H3W2GR2 prior to 1.000.HW00.21.20190812, H3W4GR1 prior to 1.000.HW00.21.20190812, HBW2GR1 prior to 1.000.HW00.21.20190812, HBW4GR1 prior to 1.000.HW00.21.20190812, HBW2GR3 prior to 1.000.HW00.21.20190812, HCW2G prior to 1.000.HW00.21.20190812, HCW4G prior to 1.000.HW00.21.20190812"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affected products where a specially crafted HTTP packet request could result in a denial of service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "IMPROPER INPUT VALIDATION CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.us-cert.gov/ics/advisories/icsa-19-304-02",
              "refsource": "MISC",
              "url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2019-18228",
    "datePublished": "2019-10-31T21:09:16",
    "dateReserved": "2019-10-22T00:00:00",
    "dateUpdated": "2024-08-05T01:47:14.023Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h2w2pc1m_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94A1FD71-3A35-4175-9C80-8965F3A59D9F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h2w2pc1m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA1EF7CE-9FA3-45DA-9047-052E27E16965\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h2w2per3_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CA4E13F-70AA-46BB-BF1D-B3797D3BD302\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h2w2per3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBF28324-68A7-4862-A881-1187A68CA97E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h2w4per3_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FD65833-D4DA-42D4-904A-0CC96E53E7D7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h2w4per3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AF4F78E-E768-4D54-A9A1-2C24FC49CB08\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4w2per2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B10341D2-EF85-4067-A470-A263773DB8F7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4w2per2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACBD1C35-BC9F-471B-AFE9-56F2C0D31251\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4w2per3_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47754C91-13A3-4096-A9D5-5F1C8BB996F2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4w2per3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DD7DF8D-F530-4C08-8ADB-16A30A411DB1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4w4per2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A7716A9-3CBB-4246-898E-017466E0E089\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4w4per2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71EBB5A3-0373-4500-BE46-8E1586AF25D3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4w4per3_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A34A7616-3680-4991-B5F9-1C1D2B15E5B4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4w4per3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC6C4016-8FE4-4DBA-999A-B25ADBD128AA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4w8pr2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1B7E0C1-B599-47CA-8D71-E5A0C5AAFE1A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4w8pr2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"717A6F11-8EA5-4F9A-9F78-8E51FBFB73A6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbd2per1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"877998DF-3C43-4ADF-951C-7F10307A08BA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbd2per1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DE7E815-4B03-484C-9F30-11B09F0236B6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbw2per1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88C5B464-E5DD-4095-98F4-8695F7722C67\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbw2per1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8CA4A19-03EC-4142-B847-0EC8C14AC9D9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbw2per2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27BBC2DE-1191-43D8-8898-AE832157D689\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbw2per2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F272578E-2BF9-4827-8838-BF2441F7CD9C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbw4per1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57413208-1D8E-486D-B2F5-4F76A9C7B311\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbw4per1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4310E58D-ABEF-4AC3-A642-71C4E5FCAAB8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbw4per2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7787C9EE-9849-4BF7-930B-47A5C2015CE2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbw4per2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"334EE3EB-61FC-413B-B5DE-5B712ECEDF59\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbw4pgr1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82C22316-FD53-4961-80CA-F18E13D4FF1A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbw4pgr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED7D3D6F-CB5B-4E76-A290-991A717CB1CB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbw8pr2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB898789-B3E5-49BB-91B8-10AA0D2056CE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbw8pr2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"687F3108-76C3-4F22-8321-59A849017886\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hed2per3_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A0E10F8-5ADF-4BD3-8660-9971A58307D8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hed2per3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D142CDFC-DB46-4765-8A71-25E0824A2322\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hew2per2_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FC032CC-68BE-4003-969E-A2AC07835D82\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hew2per2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6285BB52-C08F-4CBB-A03B-385B980A3420\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hew2per3_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"996AF0FE-AF0E-479F-8301-E55C42EE3E6B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hew2per3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93D344FD-0DED-4017-B339-CA3BE5E201C7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hew4per2b_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC835EA6-56F0-4C62-9799-D8A9C661271B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hew4per2b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA9106C1-B426-497F-835E-F0CF53139573\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hew4per3_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0457FAB2-D9D1-4897-874A-B7E8DB563278\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hew4per3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C34DF44-453D-4274-B393-D1FA8A9DE857\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hew4per3b_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9032E95-1D90-497A-A0F1-A5A3221FDF7F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hew4per3b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFF24084-97F9-4645-9C75-824217FCE8B7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hew4per2b_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC835EA6-56F0-4C62-9799-D8A9C661271B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hew4per2b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA9106C1-B426-497F-835E-F0CF53139573\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hdzp252di_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6A0ADC6-33F6-44C5-8CD5-8F6ACE685D87\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hdzp252di:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEC68AC5-197E-4A0F-A055-4800CDA24E66\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hdzp304di_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"766374A2-189C-4D2B-8329-D115717014BE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hdzp304di:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3123143-9544-45B6-81ED-84E3ECE1B905\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hpw2p1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D70E51AC-7B3C-4FD3-BBDF-7F42ACD86B48\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hpw2p1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"414E3927-B8A6-4E57-972A-27DA0163167E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h2w2gr1_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E3B9BA6-960E-4AF0-A072-DC5E6D9F1541\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h2w2gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35D3C658-893D-49F6-B17A-912B58D87B09\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affected products where a specially crafted HTTP packet request could result in a denial of service.\"}, {\"lang\": \"es\", \"value\": \"En las c\\u00e1maras IP serie equIP de Honeywell  Multiple equIP Series Cameras, una vulnerabilidad se presenta en los productos afectados donde una petici\\u00f3n de paquete HTTP especialmente dise\\u00f1ada podr\\u00eda resultar en una denegaci\\u00f3n de servicio.\"}]",
      "id": "CVE-2019-18228",
      "lastModified": "2024-11-21T04:32:52.897",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-10-31T22:15:10.940",
      "references": "[{\"url\": \"https://www.us-cert.gov/ics/advisories/icsa-19-304-02\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.us-cert.gov/ics/advisories/icsa-19-304-02\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
      "sourceIdentifier": "ics-cert@hq.dhs.gov",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-18228\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2019-10-31T22:15:10.940\",\"lastModified\":\"2024-11-21T04:32:52.897\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affected products where a specially crafted HTTP packet request could result in a denial of service.\"},{\"lang\":\"es\",\"value\":\"En las c\u00e1maras IP serie equIP de Honeywell  Multiple equIP Series Cameras, una vulnerabilidad se presenta en los productos afectados donde una petici\u00f3n de paquete HTTP especialmente dise\u00f1ada podr\u00eda resultar en una denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h2w2pc1m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94A1FD71-3A35-4175-9C80-8965F3A59D9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h2w2pc1m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA1EF7CE-9FA3-45DA-9047-052E27E16965\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h2w2per3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CA4E13F-70AA-46BB-BF1D-B3797D3BD302\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h2w2per3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBF28324-68A7-4862-A881-1187A68CA97E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h2w4per3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FD65833-D4DA-42D4-904A-0CC96E53E7D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h2w4per3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF4F78E-E768-4D54-A9A1-2C24FC49CB08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4w2per2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B10341D2-EF85-4067-A470-A263773DB8F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4w2per2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACBD1C35-BC9F-471B-AFE9-56F2C0D31251\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4w2per3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47754C91-13A3-4096-A9D5-5F1C8BB996F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4w2per3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DD7DF8D-F530-4C08-8ADB-16A30A411DB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4w4per2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7716A9-3CBB-4246-898E-017466E0E089\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4w4per2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71EBB5A3-0373-4500-BE46-8E1586AF25D3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4w4per3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A34A7616-3680-4991-B5F9-1C1D2B15E5B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4w4per3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC6C4016-8FE4-4DBA-999A-B25ADBD128AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4w8pr2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B7E0C1-B599-47CA-8D71-E5A0C5AAFE1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4w8pr2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717A6F11-8EA5-4F9A-9F78-8E51FBFB73A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbd2per1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"877998DF-3C43-4ADF-951C-7F10307A08BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbd2per1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DE7E815-4B03-484C-9F30-11B09F0236B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbw2per1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88C5B464-E5DD-4095-98F4-8695F7722C67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbw2per1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8CA4A19-03EC-4142-B847-0EC8C14AC9D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbw2per2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27BBC2DE-1191-43D8-8898-AE832157D689\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbw2per2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F272578E-2BF9-4827-8838-BF2441F7CD9C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbw4per1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57413208-1D8E-486D-B2F5-4F76A9C7B311\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbw4per1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4310E58D-ABEF-4AC3-A642-71C4E5FCAAB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbw4per2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7787C9EE-9849-4BF7-930B-47A5C2015CE2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbw4per2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"334EE3EB-61FC-413B-B5DE-5B712ECEDF59\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbw4pgr1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C22316-FD53-4961-80CA-F18E13D4FF1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbw4pgr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED7D3D6F-CB5B-4E76-A290-991A717CB1CB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbw8pr2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB898789-B3E5-49BB-91B8-10AA0D2056CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbw8pr2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687F3108-76C3-4F22-8321-59A849017886\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hed2per3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A0E10F8-5ADF-4BD3-8660-9971A58307D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hed2per3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D142CDFC-DB46-4765-8A71-25E0824A2322\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hew2per2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FC032CC-68BE-4003-969E-A2AC07835D82\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hew2per2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6285BB52-C08F-4CBB-A03B-385B980A3420\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hew2per3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"996AF0FE-AF0E-479F-8301-E55C42EE3E6B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hew2per3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D344FD-0DED-4017-B339-CA3BE5E201C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hew4per2b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC835EA6-56F0-4C62-9799-D8A9C661271B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hew4per2b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA9106C1-B426-497F-835E-F0CF53139573\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hew4per3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0457FAB2-D9D1-4897-874A-B7E8DB563278\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hew4per3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C34DF44-453D-4274-B393-D1FA8A9DE857\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hew4per3b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9032E95-1D90-497A-A0F1-A5A3221FDF7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hew4per3b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFF24084-97F9-4645-9C75-824217FCE8B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hew4per2b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC835EA6-56F0-4C62-9799-D8A9C661271B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hew4per2b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA9106C1-B426-497F-835E-F0CF53139573\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hdzp252di_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6A0ADC6-33F6-44C5-8CD5-8F6ACE685D87\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hdzp252di:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEC68AC5-197E-4A0F-A055-4800CDA24E66\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hdzp304di_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766374A2-189C-4D2B-8329-D115717014BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hdzp304di:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3123143-9544-45B6-81ED-84E3ECE1B905\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hpw2p1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D70E51AC-7B3C-4FD3-BBDF-7F42ACD86B48\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hpw2p1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"414E3927-B8A6-4E57-972A-27DA0163167E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h2w2gr1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3B9BA6-960E-4AF0-A072-DC5E6D9F1541\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h2w2gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35D3C658-893D-49F6-B17A-912B58D87B09\"}]}]}],\"references\":[{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-19-304-02\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-19-304-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…