CVE-2022-2332

Honeywell SoftMaster Incorrect Permission Assignment for Critical Resource

Description

A local unprivileged attacker may escalate to administrator privileges in Honeywell SoftMaster version 4.51, due to insecure permission assignment.

Remediation

Solution:

  • Honeywell has released firmware update packages for the affected products on their website. More information can be found in the Honeywell Security Notification SN2022-08-31 01 SoftMaster-R4.7

Workaround:

  • Honeywell recommends users with potentially affected products take the following steps to protect themselves: Update firmware of vulnerable and affected devices. Isolate systems from the internet or create additional layers of defense to their system from the internet by placing the affected hardware behind a firewall or into a demilitarized zone (DMZ). If remote connections to the network are required, then users should consider using a VPN or other means to ensure secure remote connections into the network where the device is located. More information can be found in the Honeywell Security Notification SN2022-08-31 01 SoftMaster-R4.7

Category

6.2
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.03%
Third-Party Advisory cisa.gov
Affected: Honeywell SoftMaster
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-2332?
CVE-2022-2332 has been scored as a medium severity vulnerability.
How to fix CVE-2022-2332?
To fix CVE-2022-2332: Honeywell has released firmware update packages for the affected products on their website. More information can be found in the Honeywell Security Notification SN2022-08-31 01 SoftMaster-R4.7
Is CVE-2022-2332 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-2332 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-2332?
CVE-2022-2332 affects Honeywell SoftMaster.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.