{ "document": { "acknowledgments": [ { "names": [ "Joachim Kerschbaumer" ], "summary": "discovering these vulnerabilities" }, { "organization": "Honeywell", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "summary", "text": "Joachim Kerschbaumer discovered these vulnerabilities; Honeywell reported these vulnerabilities to CISA.", "title": "Summary" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "CISAservicedesk@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-20-021-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-021-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-20-021-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-021-01" } ], "title": "ICSA-20-021-01_Honeywell Maxpro VMS & NVR", "tracking": { "current_release_date": "2020-01-21T00:00:00.000000Z", "generator": { "engine": { "name": "CISA USCert CSAF Generator", "version": "1" } }, "id": "ICSA-20-021-01", "initial_release_date": "2020-01-21T00:00:00.000000Z", "revision_history": [ { "date": "2020-01-21T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-20-021-01 Honeywell Maxpro VMS & NVR" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "< NVR 5.6 Build 595 T2-Patch", "product": { "name": "MAXPRO NVR SE: prior to Version NVR 5.6 Build 595 T2-Patch", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "MAXPRO NVR SE" }, { "branches": [ { "category": "product_version_range", "name": "< NVR 5.6 Build 595 T2-Patch", "product": { "name": "MAXPRO NVR XE: prior to Version NVR 5.6 Build 595 T2-Patch", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "MAXPRO NVR XE" }, { "branches": [ { "category": "product_version_range", "name": "< VMS560 Build 595 T2-Patch", "product": { "name": "HNMSWVMS: prior to Version VMS560 Build 595 T2-Patch", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "HNMSWVMS" }, { "branches": [ { "category": "product_version_range", "name": "< NVR 5.6 Build 595 T2-Patch", "product": { "name": "MAXPRO NVR PE: prior to Version NVR 5.6 Build 595 T2-Patch", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "MAXPRO NVR PE" }, { "branches": [ { "category": "product_version_range", "name": "< NVR 5.6 Build 595 T2-Patch", "product": { "name": "MPNVRSWXX: prior to Version NVR 5.6 Build 595 T2-Patch", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "MPNVRSWXX" }, { "branches": [ { "category": "product_version_range", "name": "< VMS560 Build 595 T2-Patch", "product": { "name": "HNMSWVMSLT: prior to Version VMS560 Build 595 T2-Patch", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "HNMSWVMSLT" } ], "category": "vendor", "name": "Honeywell" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-6959", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" }, "notes": [ { "category": "summary", "text": "The affected products are vulnerable to an unsafe deserialization of untrusted data. An attacker may be able to remotely modify deserialized data without authentication using a specially crafted web request, resulting in remote code execution.CVE-2020-6959 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Honeywell recommends users update VMS 560 Build 595 T2-Patch for affected VMS systems, and NVR 5.6 Build 595 T2-Patch for affected NVR systems. The updates can be found at the Honeywell's MyWebTech site via a user account. Additionally, Honeywell recommends that users:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://mywebtech.honeywell.com/Home" }, { "category": "mitigation", "details": "Update MAXPRO VMS and NVR to latest R560 and 5.6 before applying this patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, { "category": "mitigation", "details": "Update software patch as recommended in Honeywell security notification (SN 2019-10-25 01).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://www.security.honeywell.com/resources/eol-and-security-notices" }, { "category": "mitigation", "details": "As a best practice, Honeywell recommends users isolate their systems from the Internet or create additional layers of defense by placing the affected hardware behind a firewall or into a DMZ; and if remote connections to the network are required, consider using a VPN or other means to ensure secure remote connections into the network where the device is located.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2020-6959" }, { "cve": "CVE-2020-6960", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" }, "notes": [ { "category": "summary", "text": "A SQL injection vulnerability exists that could give an attacker remote unauthenticated access to the web user interface with administrator-level privileges.CVE-2020-6960 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Honeywell recommends users update VMS 560 Build 595 T2-Patch for affected VMS systems, and NVR 5.6 Build 595 T2-Patch for affected NVR systems. The updates can be found at the Honeywell's MyWebTech site via a user account. Additionally, Honeywell recommends that users:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://mywebtech.honeywell.com/Home" }, { "category": "mitigation", "details": "Update MAXPRO VMS and NVR to latest R560 and 5.6 before applying this patch.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] }, { "category": "mitigation", "details": "Update software patch as recommended in Honeywell security notification (SN 2019-10-25 01).", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ], "url": "https://www.security.honeywell.com/resources/eol-and-security-notices" }, { "category": "mitigation", "details": "As a best practice, Honeywell recommends users isolate their systems from the Internet or create additional layers of defense by placing the affected hardware behind a firewall or into a DMZ; and if remote connections to the network are required, consider using a VPN or other means to ensure secure remote connections into the network where the device is located.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006" ] } ], "title": "CVE-2020-6960" } ] }