Honeywell Experion PKS and ACE controllers are vulnerable to relative path traversal, impacting C200, C200E, C300, and ACE versions. Learn the impact, mitigation, and patch details.
Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to relative path traversal. This vulnerability can potentially grant unauthorized access to files and directories by attackers.
Understanding CVE-2021-38399
What is CVE-2021-38399?
Honeywell Experion PKS and ACE Controllers are affected by a relative path traversal vulnerability, allowing attackers to access unauthorized files and directories.
The Impact of CVE-2021-38399
The vulnerability may lead to unauthorized access and compromise of sensitive information stored on the affected controllers.
Technical Details of CVE-2021-38399
Vulnerability Description
CVE-2021-38399 involves a relative path traversal issue in Honeywell Experion PKS C200, C200E, C300, and ACE controllers, potentially leading to unauthorized file and directory access.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by attackers to navigate through file systems and access restricted files and directories on the affected controllers.
Mitigation and Prevention
Immediate Steps to Take
Users are advised to follow all guidance provided in the Experion Network and Security Planning Guide by Honeywell to prevent malicious attacks. Additional information is available in the Honeywell Support document SN2021-02-22-01.
Long-Term Security Practices
Implement robust security measures, including regular security assessments, network segmentation, and access control policies, to enhance the overall security posture.
Patching and Updates
It is crucial for users to apply security patches and updates provided by Honeywell to mitigate the CVE-2021-38399 vulnerability effectively.