CVE-2019-18230 (GCVE-0-2019-18230)

Vulnerability from cvelistv5 – Published: 2019-10-31 21:15 – Updated: 2024-08-05 01:47
VLAI?
Summary
Honeywell equIP and Performance series IP cameras, multiple versions, A vulnerability exists where the affected product allows unauthenticated access to audio streaming over HTTP.
Severity ?
No CVSS data available.
CWE
Assigner
References
Impacted products
Vendor Product Version
n/a Honeywell equIP & Performance series IP cameras Affected: equIP Camera,Vulnability fixed from version,H2W2GR1 1.000.0000.18.20190409,H3W2GR1 1.000.HW00.21.20190812,H3W2GR1V 1.000.0000.18.20190409,H3W2GR2 1.000.HW00.21.20190812,H3W4GR1 1.000.HW00.21.20190812,H3W4GR1V 1.000.0000.18.20190409,H4D8GR1 2.420.HW00.9.20180510,H4L2GR1 1.000.0000.18.20190423,H4L2GR1V 1.000.0000.18.20190423,H4L6GR2 1.000.HW02.8.20190813,H4LGGR2 .000.HW04.3.20190813,H4W2GR1 1.000.HW00.21.20190812,H4W2GR1V 1.000.0000.18.20190409,H4W2GR2 1.000.HW00.21.20190812,H4W4GR1 1.000.HW00.21.20190812,H4W4GR1V 1.000.0000.18.20190409,HBD8GR1 2.420.HW00.9.20180510,HBL2GR1 2.420.HW01.33.20190812,HBL2GR1V 1.000.0000.18.20190423,HBL6GR2 1.000.HW04.3.20190813,HBL6GR2 1.000.HW02.8.20190813,HBW2GR1 1.000.HW00.21.20190812, HBW2GR1V 1.000.0000.18.20190409,HBW2GR3 1.000.HW00.21.20190812,HBW2GR3V 1.000.0000.18.20190409,HBW4GR1 1.000.HW00.21.20190812, HBW4GR1V 1.000.0000.18.20190409,HCD8G 2.420.HW00.9.20180510,HCL2G 1.000.0000.18.20190423,HCL2GV 1.000.0000.18.20190423,HCW2G 1.000.HW00.21.20190812,HCW2GV ...[truncated*]
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:47:14.024Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-03"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Honeywell equIP \u0026 Performance series IP cameras",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "equIP Camera,Vulnability fixed from version,H2W2GR1 1.000.0000.18.20190409,H3W2GR1 1.000.HW00.21.20190812,H3W2GR1V 1.000.0000.18.20190409,H3W2GR2 1.000.HW00.21.20190812,H3W4GR1 1.000.HW00.21.20190812,H3W4GR1V 1.000.0000.18.20190409,H4D8GR1 2.420.HW00.9.20180510,H4L2GR1 1.000.0000.18.20190423,H4L2GR1V 1.000.0000.18.20190423,H4L6GR2 1.000.HW02.8.20190813,H4LGGR2 .000.HW04.3.20190813,H4W2GR1 1.000.HW00.21.20190812,H4W2GR1V 1.000.0000.18.20190409,H4W2GR2 1.000.HW00.21.20190812,H4W4GR1 1.000.HW00.21.20190812,H4W4GR1V 1.000.0000.18.20190409,HBD8GR1 2.420.HW00.9.20180510,HBL2GR1 2.420.HW01.33.20190812,HBL2GR1V 1.000.0000.18.20190423,HBL6GR2 1.000.HW04.3.20190813,HBL6GR2 1.000.HW02.8.20190813,HBW2GR1 1.000.HW00.21.20190812, HBW2GR1V 1.000.0000.18.20190409,HBW2GR3 1.000.HW00.21.20190812,HBW2GR3V 1.000.0000.18.20190409,HBW4GR1 1.000.HW00.21.20190812, HBW4GR1V 1.000.0000.18.20190409,HCD8G 2.420.HW00.9.20180510,HCL2G 1.000.0000.18.20190423,HCL2GV 1.000.0000.18.20190423,HCW2G 1.000.HW00.21.20190812,HCW2GV  ...[truncated*]"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Honeywell equIP and Performance series IP cameras, multiple versions, A vulnerability exists where the affected product allows unauthenticated access to audio streaming over HTTP."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-31T21:15:32",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-03"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2019-18230",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Honeywell equIP \u0026 Performance series IP cameras",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "equIP Camera,Vulnability fixed from version,H2W2GR1 1.000.0000.18.20190409,H3W2GR1 1.000.HW00.21.20190812,H3W2GR1V 1.000.0000.18.20190409,H3W2GR2 1.000.HW00.21.20190812,H3W4GR1 1.000.HW00.21.20190812,H3W4GR1V 1.000.0000.18.20190409,H4D8GR1 2.420.HW00.9.20180510,H4L2GR1 1.000.0000.18.20190423,H4L2GR1V 1.000.0000.18.20190423,H4L6GR2 1.000.HW02.8.20190813,H4LGGR2 .000.HW04.3.20190813,H4W2GR1 1.000.HW00.21.20190812,H4W2GR1V 1.000.0000.18.20190409,H4W2GR2 1.000.HW00.21.20190812,H4W4GR1 1.000.HW00.21.20190812,H4W4GR1V 1.000.0000.18.20190409,HBD8GR1 2.420.HW00.9.20180510,HBL2GR1 2.420.HW01.33.20190812,HBL2GR1V 1.000.0000.18.20190423,HBL6GR2 1.000.HW04.3.20190813,HBL6GR2 1.000.HW02.8.20190813,HBW2GR1 1.000.HW00.21.20190812, HBW2GR1V 1.000.0000.18.20190409,HBW2GR3 1.000.HW00.21.20190812,HBW2GR3V 1.000.0000.18.20190409,HBW4GR1 1.000.HW00.21.20190812, HBW4GR1V 1.000.0000.18.20190409,HCD8G 2.420.HW00.9.20180510,HCL2G 1.000.0000.18.20190423,HCL2GV 1.000.0000.18.20190423,HCW2G 1.000.HW00.21.20190812,HCW2GV 1.000.0000.18.20190409,HCW4G 1.000.HW00.21.20190812,HDZ302D 1.000.0041.20180530,HDZ302DE 1.000.0041.20180530,HDZ302DIN 1.000.0041.20180530,HDZ302DIN-C1 1.000.0041.20180530,HDZ302DIN-S1 1.000.0041.20180530,HDZ302LIK 1.000.61.1.20180607,HDZ302LIW 1.000.61.1.20180607,HFD6GR1 1.000.HW00.9.20180510,HFD8GR1 1.000.HW00.9.20180510,HM4L8GR1 1.000.HW02.8.20190813,HMBL8GR1 1.000.HW02.8.20190813,Performance Series Vulnability fixed from version,H4D8PR1 1.000.HW01.3.20190820,HFD5PR1 1.000.HW01.1.20190822,HPW2P1 1.000.HW01.3.20190820,HDZP304DI 1.000.HW10.5.20190812,HDZP252DI 1.000.HW02.3.20181109"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Honeywell equIP and Performance series IP cameras, multiple versions, A vulnerability exists where the affected product allows unauthenticated access to audio streaming over HTTP."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-306"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.us-cert.gov/ics/advisories/icsa-19-304-03",
              "refsource": "MISC",
              "url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-03"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2019-18230",
    "datePublished": "2019-10-31T21:15:32",
    "dateReserved": "2019-10-22T00:00:00",
    "dateUpdated": "2024-08-05T01:47:14.024Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4d8pr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw01.3.20190820\", \"matchCriteriaId\": \"8F7C6114-0ABC-4FD9-B709-D0B82DB9AD6E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4d8pr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0087979-D5F3-47C1-A5C9-6B91CBA40914\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hfd5pr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw01.1.20190822\", \"matchCriteriaId\": \"D46CE7CC-4795-4408-B441-01B144BDA89F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hfd5pr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B8CE3FF-1ECA-4F92-9E1D-56008B9BAFBF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hpw2p1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw01.3.20190820\", \"matchCriteriaId\": \"C8D59274-1659-4593-B6BD-2AB6567E336F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hpw2p1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"414E3927-B8A6-4E57-972A-27DA0163167E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hdzp304di_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw10.5.20190812\", \"matchCriteriaId\": \"1F99CF9C-9508-4D2E-8DA2-D92AC808F707\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hdzp304di:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3123143-9544-45B6-81ED-84E3ECE1B905\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hdzp252di_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw02.3.20181109\", \"matchCriteriaId\": \"48783F07-0946-4637-B157-C36EF6648661\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hdzp252di:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEC68AC5-197E-4A0F-A055-4800CDA24E66\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hdz302din-s1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0041.20180530\", \"matchCriteriaId\": \"45DC8B05-6D6F-439A-B83D-2B83814B5433\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hdz302din-s1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A5CFE2B-19B9-43E6-901B-30DB3EDCF698\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hdz302lik_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.61.1.20180607\", \"matchCriteriaId\": \"DC5F0831-0769-4CAE-B7F2-A2FCB508C66E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hdz302lik:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FF469F2-2441-4012-9349-3FC39A177E16\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hdz302liw_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.61.1.20180607\", \"matchCriteriaId\": \"E6F83FBB-5051-48FE-B772-90612FB27ED0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hdz302liw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60D1036C-D4D5-476E-813A-729E9250B5DD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hfd6gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.9.20180510\", \"matchCriteriaId\": \"A3F98ED9-FA86-4688-AF41-F9FAC269194C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hfd6gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2A27649-A042-439B-A569-DEC3FD82A3D6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hfd8gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.9.20180510\", \"matchCriteriaId\": \"0131324A-10EF-4897-A37E-695EF82818E5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hfd8gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8400E98-2092-4B38-B69A-F37360F5BCF1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hm4l8gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw02.8.20190813\", \"matchCriteriaId\": \"A61BB321-C0C1-447A-AB92-280BF41DD38F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hm4l8gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A2F39C2-8F06-44CC-A1BE-AFFC7F9D5783\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hmbl8gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw02.8.20190813\", \"matchCriteriaId\": \"FC820CC0-AE09-4ED1-9C97-3833E1895605\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hmbl8gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53D8C69A-D83D-4342-A4A3-6D0978CE761A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h2w2gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190409\", \"matchCriteriaId\": \"885D7C5F-26C8-4BA6-8B13-4B585DA0D3EE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h2w2gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35D3C658-893D-49F6-B17A-912B58D87B09\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h3w2gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.21.20190812\", \"matchCriteriaId\": \"F2EEC88B-7325-427F-A165-18F9361B74A4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h3w2gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E2FC9E9-D29F-49B0-98A0-4DF8D2A8AFBF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h3w2gr1v_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190409\", \"matchCriteriaId\": \"FF4DED89-1B77-4551-9666-A62EFA59E237\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h3w2gr1v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37732000-B042-4C65-A7AD-71D320A8DDB0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h3w2gr2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.21.20190812\", \"matchCriteriaId\": \"DF7EF078-CB34-437D-9EB5-C674BC661FA2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h3w2gr2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B96C23F9-EB20-4AE8-BB8C-CD34AC2ADA5D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h3w4gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.21.20190812\", \"matchCriteriaId\": \"31019720-DCD2-4CB9-B5AA-0250B2423F5C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h3w4gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3419902-0162-4304-97DA-5273F4E185BD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h3w4gr1v_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190409\", \"matchCriteriaId\": \"C28B3918-28B4-41D0-B63E-A36F6A4B642D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h3w4gr1v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09D72180-4728-47E8-B268-FEA1ADFD16B1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4d8gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.420.hw00.9.20180510\", \"matchCriteriaId\": \"F20916C6-38DC-4328-8C45-B3EBB6711360\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4d8gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73D9F9ED-E57E-4187-BABD-CDB70F261296\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4l2gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190423\", \"matchCriteriaId\": \"8F066AFA-FC83-4329-8BD2-31136770D607\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4l2gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0395AB8D-65D9-4A03-8629-DC318AE5E120\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4l2gr1v_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190423\", \"matchCriteriaId\": \"AEF45C26-938E-4B15-AD99-918B104AA0A8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4l2gr1v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2908FC2D-40C1-4E65-BD23-DCE8B24B4C5A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4l6gr2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw02.8.20190813\", \"matchCriteriaId\": \"0A867DDF-D118-485E-A807-97EDE8303041\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4l6gr2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4E38F48-5F11-47A5-9858-EB31D00E254E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4lggr2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw04.3.20190813\", \"matchCriteriaId\": \"C85700B4-E4C1-4A90-830F-CBEA7137D0B6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4lggr2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ACB6FFB-2983-4ECE-BCF2-D1BD0FA9F5A5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4w2gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.21.20190812\", \"matchCriteriaId\": \"90C93984-A8DF-410A-A65A-3A30A3CCF27B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4w2gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4C2C198-3C0C-4F62-A7A6-A06D2E21E406\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4w2gr1v_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190409\", \"matchCriteriaId\": \"B2E9CFDE-DAB8-4828-997B-52C9459BEB35\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4w2gr1v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D37618E-44CE-4E7A-8559-A2844D43C433\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4w2gr2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.21.20190812\", \"matchCriteriaId\": \"8DE0D64A-5EEE-442C-A1C3-F95E7A196F93\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4w2gr2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B806C40-EA96-4DCC-8311-85A9D78E23F0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4w4gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.21.20190812\", \"matchCriteriaId\": \"7FA5C2FF-B877-4D6D-91AD-519491A1EBE9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4w4gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F8C5BFC-7817-4E82-A351-5960E1AD891C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:h4w4gr1v_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190409\", \"matchCriteriaId\": \"45830A0E-9EFE-4090-9F13-AF6480216D42\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:h4w4gr1v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39A84649-C4A1-41B6-A958-8C22570B3175\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbd8gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.420.hw00.9.20180510\", \"matchCriteriaId\": \"D7E58E04-C957-4D5C-AE95-DD7B130FD1D3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbd8gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6F4352A-3D27-4555-B188-03CD40545CCD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbl2gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.420.hw01.33.20190812\", \"matchCriteriaId\": \"07E38B1B-DC53-44A1-96E2-0D1FE34EB6F0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbl2gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96437B7C-EFC9-4660-B778-692A545A511E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbl2gr1v_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190423\", \"matchCriteriaId\": \"70D1D498-E87F-4733-B657-ACA3ACB84934\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbl2gr1v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B105FB2D-E283-4A26-B38E-C1A4A1141FC6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbl6gr2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw04.3.20190813\", \"matchCriteriaId\": \"0580F68B-4580-4F4A-B64F-3D515F76E324\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbl6gr2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B99D4E17-DBA8-41AD-9C8F-61550EA3B767\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbl6gr2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw02.8.20190813\", \"matchCriteriaId\": \"0FEA964F-690B-4218-B1C7-A0A6581C837D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbl6gr2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B99D4E17-DBA8-41AD-9C8F-61550EA3B767\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbw2gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.21.20190812\", \"matchCriteriaId\": \"2027345C-F585-40A2-A1BC-73E7F9AA8780\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbw2gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5653DE5B-ED7D-48DF-AB97-56FC321FA4AF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbw2gr1v_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190409\", \"matchCriteriaId\": \"72C4EAB2-5761-4FEB-A05F-096C5BF4B855\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbw2gr1v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0307DDBD-B50C-4052-A6EC-5BBF8A63A9DE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbw2gr3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.21.20190812\", \"matchCriteriaId\": \"6B266034-9B98-4761-9A37-0B54A661DD43\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbw2gr3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39BA81EF-96E2-41AA-9508-600662691DF1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbw2gr3v_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190409\", \"matchCriteriaId\": \"466ADA61-D46A-4B56-B5E1-B6D2F1D071DC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbw2gr3v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E379EDE-DD1B-4DFE-AB39-5B45EA0A8398\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbw4gr1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.21.20190812\", \"matchCriteriaId\": \"1174D29E-9B52-47D3-856E-779BC809A019\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbw4gr1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA95C074-1360-478E-8083-4F16BD1DC451\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hbw4gr1v_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190409\", \"matchCriteriaId\": \"3CCA15F8-407B-4347-8339-963FB3439E45\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hbw4gr1v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7994EC06-FC72-4EC6-B061-57416FC8838C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hcd8g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.420.hw00.9.20180510\", \"matchCriteriaId\": \"19972F3D-03DA-4B6A-8A24-23A8E87976BC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hcd8g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E79054B-A724-4D0F-BD15-928D3B591136\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hcl2g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190423\", \"matchCriteriaId\": \"65217B2F-FBD8-4DA4-977F-D97D790A8D33\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hcl2g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66B8500B-88FC-4372-B97D-5EE195DBE938\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hcl2gv_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190423\", \"matchCriteriaId\": \"9F54DBCC-5624-4175-AD65-ED9D67CA04EB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hcl2gv:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"264E205D-C14A-4C6D-B23F-3E0655AEBBDF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hcw2g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.21.20190812\", \"matchCriteriaId\": \"B95790C6-15B8-4416-9ABB-FCB3FF7C3E58\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hcw2g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66A0569A-ADBE-4BA9-9A42-CA41134099B2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hcw2gv_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0000.18.20190409\", \"matchCriteriaId\": \"4E7AEDF9-1B0C-4B0B-8F0F-E72946E83AF7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hcw2gv:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6F56435-9D0B-410A-A77D-17D9B3543417\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hcw4g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.hw00.21.20190812\", \"matchCriteriaId\": \"7BF20DCC-A357-4B7D-AD82-7F2865F60A4E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hcw4g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"859CD6B5-8946-408F-B0C2-16F3B564A090\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hdz302d_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0041.20180530\", \"matchCriteriaId\": \"80E7680F-EACF-4A3D-9132-5F0C1034D6F1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hdz302d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3236AAD2-B29C-4A43-A080-DF01534CD8FD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hdz302de_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0041.20180530\", \"matchCriteriaId\": \"9FCE5563-C583-438F-89C3-2E784A0BA8A9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hdz302de:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCF6422D-E221-4B5A-A801-38A13305186F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hdz302din_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0041.20180530\", \"matchCriteriaId\": \"B3BD56F2-914F-4E71-A361-2FF860249227\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hdz302din:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30ABEDE1-5064-4169-AA1A-5F114885910B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:honeywell:hdz302din-c1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.000.0041.20180530\", \"matchCriteriaId\": \"7C5B91A7-8CA4-40B9-A39E-C06DCAA5BEE6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:honeywell:hdz302din-c1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4921E9DF-F2AC-4EDC-B0C9-A25A6FC4096F\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Honeywell equIP and Performance series IP cameras, multiple versions, A vulnerability exists where the affected product allows unauthenticated access to audio streaming over HTTP.\"}, {\"lang\": \"es\", \"value\": \"En las c\\u00e1maras IP Honeywell equIP and Performance series, m\\u00faltiples versiones, una vulnerabilidad se presenta donde el producto afectado permite el acceso no autenticado a la transmisi\\u00f3n de audio mediante HTTP.\"}]",
      "id": "CVE-2019-18230",
      "lastModified": "2024-11-21T04:32:53.170",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-10-31T22:15:11.080",
      "references": "[{\"url\": \"https://www.us-cert.gov/ics/advisories/icsa-19-304-03\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.us-cert.gov/ics/advisories/icsa-19-304-03\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
      "sourceIdentifier": "ics-cert@hq.dhs.gov",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-306\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-306\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-18230\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2019-10-31T22:15:11.080\",\"lastModified\":\"2024-11-21T04:32:53.170\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Honeywell equIP and Performance series IP cameras, multiple versions, A vulnerability exists where the affected product allows unauthenticated access to audio streaming over HTTP.\"},{\"lang\":\"es\",\"value\":\"En las c\u00e1maras IP Honeywell equIP and Performance series, m\u00faltiples versiones, una vulnerabilidad se presenta donde el producto afectado permite el acceso no autenticado a la transmisi\u00f3n de audio mediante HTTP.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-306\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4d8pr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw01.3.20190820\",\"matchCriteriaId\":\"8F7C6114-0ABC-4FD9-B709-D0B82DB9AD6E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4d8pr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0087979-D5F3-47C1-A5C9-6B91CBA40914\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hfd5pr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw01.1.20190822\",\"matchCriteriaId\":\"D46CE7CC-4795-4408-B441-01B144BDA89F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hfd5pr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8CE3FF-1ECA-4F92-9E1D-56008B9BAFBF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hpw2p1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw01.3.20190820\",\"matchCriteriaId\":\"C8D59274-1659-4593-B6BD-2AB6567E336F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hpw2p1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"414E3927-B8A6-4E57-972A-27DA0163167E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hdzp304di_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw10.5.20190812\",\"matchCriteriaId\":\"1F99CF9C-9508-4D2E-8DA2-D92AC808F707\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hdzp304di:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3123143-9544-45B6-81ED-84E3ECE1B905\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hdzp252di_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw02.3.20181109\",\"matchCriteriaId\":\"48783F07-0946-4637-B157-C36EF6648661\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hdzp252di:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEC68AC5-197E-4A0F-A055-4800CDA24E66\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hdz302din-s1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0041.20180530\",\"matchCriteriaId\":\"45DC8B05-6D6F-439A-B83D-2B83814B5433\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hdz302din-s1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A5CFE2B-19B9-43E6-901B-30DB3EDCF698\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hdz302lik_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.61.1.20180607\",\"matchCriteriaId\":\"DC5F0831-0769-4CAE-B7F2-A2FCB508C66E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hdz302lik:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FF469F2-2441-4012-9349-3FC39A177E16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hdz302liw_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.61.1.20180607\",\"matchCriteriaId\":\"E6F83FBB-5051-48FE-B772-90612FB27ED0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hdz302liw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60D1036C-D4D5-476E-813A-729E9250B5DD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hfd6gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.9.20180510\",\"matchCriteriaId\":\"A3F98ED9-FA86-4688-AF41-F9FAC269194C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hfd6gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A27649-A042-439B-A569-DEC3FD82A3D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hfd8gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.9.20180510\",\"matchCriteriaId\":\"0131324A-10EF-4897-A37E-695EF82818E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hfd8gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8400E98-2092-4B38-B69A-F37360F5BCF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hm4l8gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw02.8.20190813\",\"matchCriteriaId\":\"A61BB321-C0C1-447A-AB92-280BF41DD38F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hm4l8gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2F39C2-8F06-44CC-A1BE-AFFC7F9D5783\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hmbl8gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw02.8.20190813\",\"matchCriteriaId\":\"FC820CC0-AE09-4ED1-9C97-3833E1895605\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hmbl8gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D8C69A-D83D-4342-A4A3-6D0978CE761A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h2w2gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190409\",\"matchCriteriaId\":\"885D7C5F-26C8-4BA6-8B13-4B585DA0D3EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h2w2gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35D3C658-893D-49F6-B17A-912B58D87B09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h3w2gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.21.20190812\",\"matchCriteriaId\":\"F2EEC88B-7325-427F-A165-18F9361B74A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h3w2gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E2FC9E9-D29F-49B0-98A0-4DF8D2A8AFBF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h3w2gr1v_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190409\",\"matchCriteriaId\":\"FF4DED89-1B77-4551-9666-A62EFA59E237\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h3w2gr1v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37732000-B042-4C65-A7AD-71D320A8DDB0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h3w2gr2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.21.20190812\",\"matchCriteriaId\":\"DF7EF078-CB34-437D-9EB5-C674BC661FA2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h3w2gr2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B96C23F9-EB20-4AE8-BB8C-CD34AC2ADA5D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h3w4gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.21.20190812\",\"matchCriteriaId\":\"31019720-DCD2-4CB9-B5AA-0250B2423F5C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h3w4gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3419902-0162-4304-97DA-5273F4E185BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h3w4gr1v_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190409\",\"matchCriteriaId\":\"C28B3918-28B4-41D0-B63E-A36F6A4B642D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h3w4gr1v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09D72180-4728-47E8-B268-FEA1ADFD16B1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4d8gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.420.hw00.9.20180510\",\"matchCriteriaId\":\"F20916C6-38DC-4328-8C45-B3EBB6711360\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4d8gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73D9F9ED-E57E-4187-BABD-CDB70F261296\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4l2gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190423\",\"matchCriteriaId\":\"8F066AFA-FC83-4329-8BD2-31136770D607\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4l2gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0395AB8D-65D9-4A03-8629-DC318AE5E120\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4l2gr1v_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190423\",\"matchCriteriaId\":\"AEF45C26-938E-4B15-AD99-918B104AA0A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4l2gr1v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2908FC2D-40C1-4E65-BD23-DCE8B24B4C5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4l6gr2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw02.8.20190813\",\"matchCriteriaId\":\"0A867DDF-D118-485E-A807-97EDE8303041\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4l6gr2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4E38F48-5F11-47A5-9858-EB31D00E254E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4lggr2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw04.3.20190813\",\"matchCriteriaId\":\"C85700B4-E4C1-4A90-830F-CBEA7137D0B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4lggr2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ACB6FFB-2983-4ECE-BCF2-D1BD0FA9F5A5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4w2gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.21.20190812\",\"matchCriteriaId\":\"90C93984-A8DF-410A-A65A-3A30A3CCF27B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4w2gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4C2C198-3C0C-4F62-A7A6-A06D2E21E406\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4w2gr1v_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190409\",\"matchCriteriaId\":\"B2E9CFDE-DAB8-4828-997B-52C9459BEB35\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4w2gr1v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D37618E-44CE-4E7A-8559-A2844D43C433\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4w2gr2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.21.20190812\",\"matchCriteriaId\":\"8DE0D64A-5EEE-442C-A1C3-F95E7A196F93\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4w2gr2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B806C40-EA96-4DCC-8311-85A9D78E23F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4w4gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.21.20190812\",\"matchCriteriaId\":\"7FA5C2FF-B877-4D6D-91AD-519491A1EBE9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4w4gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F8C5BFC-7817-4E82-A351-5960E1AD891C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:h4w4gr1v_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190409\",\"matchCriteriaId\":\"45830A0E-9EFE-4090-9F13-AF6480216D42\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:h4w4gr1v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39A84649-C4A1-41B6-A958-8C22570B3175\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbd8gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.420.hw00.9.20180510\",\"matchCriteriaId\":\"D7E58E04-C957-4D5C-AE95-DD7B130FD1D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbd8gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6F4352A-3D27-4555-B188-03CD40545CCD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbl2gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.420.hw01.33.20190812\",\"matchCriteriaId\":\"07E38B1B-DC53-44A1-96E2-0D1FE34EB6F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbl2gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96437B7C-EFC9-4660-B778-692A545A511E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbl2gr1v_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190423\",\"matchCriteriaId\":\"70D1D498-E87F-4733-B657-ACA3ACB84934\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbl2gr1v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B105FB2D-E283-4A26-B38E-C1A4A1141FC6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbl6gr2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw04.3.20190813\",\"matchCriteriaId\":\"0580F68B-4580-4F4A-B64F-3D515F76E324\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbl6gr2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B99D4E17-DBA8-41AD-9C8F-61550EA3B767\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbl6gr2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw02.8.20190813\",\"matchCriteriaId\":\"0FEA964F-690B-4218-B1C7-A0A6581C837D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbl6gr2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B99D4E17-DBA8-41AD-9C8F-61550EA3B767\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbw2gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.21.20190812\",\"matchCriteriaId\":\"2027345C-F585-40A2-A1BC-73E7F9AA8780\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbw2gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5653DE5B-ED7D-48DF-AB97-56FC321FA4AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbw2gr1v_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190409\",\"matchCriteriaId\":\"72C4EAB2-5761-4FEB-A05F-096C5BF4B855\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbw2gr1v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0307DDBD-B50C-4052-A6EC-5BBF8A63A9DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbw2gr3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.21.20190812\",\"matchCriteriaId\":\"6B266034-9B98-4761-9A37-0B54A661DD43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbw2gr3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39BA81EF-96E2-41AA-9508-600662691DF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbw2gr3v_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190409\",\"matchCriteriaId\":\"466ADA61-D46A-4B56-B5E1-B6D2F1D071DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbw2gr3v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E379EDE-DD1B-4DFE-AB39-5B45EA0A8398\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbw4gr1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.21.20190812\",\"matchCriteriaId\":\"1174D29E-9B52-47D3-856E-779BC809A019\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbw4gr1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA95C074-1360-478E-8083-4F16BD1DC451\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hbw4gr1v_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190409\",\"matchCriteriaId\":\"3CCA15F8-407B-4347-8339-963FB3439E45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hbw4gr1v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7994EC06-FC72-4EC6-B061-57416FC8838C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hcd8g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.420.hw00.9.20180510\",\"matchCriteriaId\":\"19972F3D-03DA-4B6A-8A24-23A8E87976BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hcd8g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E79054B-A724-4D0F-BD15-928D3B591136\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hcl2g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190423\",\"matchCriteriaId\":\"65217B2F-FBD8-4DA4-977F-D97D790A8D33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hcl2g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66B8500B-88FC-4372-B97D-5EE195DBE938\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hcl2gv_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190423\",\"matchCriteriaId\":\"9F54DBCC-5624-4175-AD65-ED9D67CA04EB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hcl2gv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"264E205D-C14A-4C6D-B23F-3E0655AEBBDF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hcw2g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.21.20190812\",\"matchCriteriaId\":\"B95790C6-15B8-4416-9ABB-FCB3FF7C3E58\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hcw2g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66A0569A-ADBE-4BA9-9A42-CA41134099B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hcw2gv_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0000.18.20190409\",\"matchCriteriaId\":\"4E7AEDF9-1B0C-4B0B-8F0F-E72946E83AF7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hcw2gv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6F56435-9D0B-410A-A77D-17D9B3543417\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hcw4g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.hw00.21.20190812\",\"matchCriteriaId\":\"7BF20DCC-A357-4B7D-AD82-7F2865F60A4E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hcw4g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"859CD6B5-8946-408F-B0C2-16F3B564A090\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hdz302d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0041.20180530\",\"matchCriteriaId\":\"80E7680F-EACF-4A3D-9132-5F0C1034D6F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hdz302d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3236AAD2-B29C-4A43-A080-DF01534CD8FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hdz302de_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0041.20180530\",\"matchCriteriaId\":\"9FCE5563-C583-438F-89C3-2E784A0BA8A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hdz302de:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCF6422D-E221-4B5A-A801-38A13305186F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hdz302din_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0041.20180530\",\"matchCriteriaId\":\"B3BD56F2-914F-4E71-A361-2FF860249227\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hdz302din:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30ABEDE1-5064-4169-AA1A-5F114885910B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:honeywell:hdz302din-c1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.000.0041.20180530\",\"matchCriteriaId\":\"7C5B91A7-8CA4-40B9-A39E-C06DCAA5BEE6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:honeywell:hdz302din-c1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4921E9DF-F2AC-4EDC-B0C9-A25A6FC4096F\"}]}]}],\"references\":[{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-19-304-03\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-19-304-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…