Honeywell Alert
2685Warning Date
Severity Level
Warning Number
Target Sector
27 July, 2022
● High
2022-5068
All
Description:
Honeywell has released a security alert to address several vulnerabilities in the following products:
- Saia Burgess PG5 PCD: All versions
- Safety Manager: (CVE-2022-30315, CVE-2022-30313, and CVE-2022-30316) All versions
- Safety Manager: (CVE-2022-30314) Versions prior to R160.1
Threats:
Attacker could exploit these vulnerabilities by doing the following:
- Denial of service attack (DoS)
- Execute arbitrary code -remotely
Best practice and Recommendations:
The CERT team recommends the following:
- For CVE-2022-30315 and CVE2022-30313:
- Safety Manager and FSC use a key switch control to prevent users from downloading unauthorized safety logic. When the key switch is in the locked state, users cannot download any logic whatsoever.
- Safety builder should reside on a station with restrictive access controls. Network controls should be in place to limit the nodes permitted to communicate the builder protocol to the safety manager.
- Users are advised to follow the Safety Manager release documentation.
- For CVE-2022-30314:
- Safety Manager R160.1 and later releases include a remediation for this item. R160.1 was introduced in October 2014. Users are advised to operate on the latest release and point release.
- Customers should isolate process control networks following our security best practices.
- Users are advised to follow the Safety Manager Release documentation; see the section “Security Recommendations and Best Practices”.
- For CVE-2022-30316:
- The Safety Manager key switch prevents unauthorized firmware from being installed. Users are advised to monitor the key switch position.
- Users are advised to follow the Safety Manager Release documentation; see the section “Security Recommendations and Best Practices”.
- Apply product updates as available.
- Follow guidance in the product security manual to ensure isolation of network segments upon which automation controllers reside.
- Ensure adequate security controls are in place between OT and IT network segments.
- Disable unnecessary accounts and services.
- Follow a least privilege approach and restrict system access to authorized personnel.
- Apply defense-in-depth strategies.
- Log and monitor network traffic for suspicious activity.