Honeywell released new firmware to mitigate a missing authentication for critical function vulnerability in its equIP series and Performance series IP cameras, according to a report with CISA.
Successful exploitation of this remotely exploitable vulnerability, which Honeywell self-reported, could result in unauthenticated access. Honeywell reports this vulnerability affects the equIP series and Performance series IP cameras listed fully in the following Honeywell Security Notification SN 2019-09-04 01.
A vulnerability exists where the affected product allows unauthenticated access to audio streaming over HTTP.
CVE-2019-18230 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.5.
The product sees use mainly in the commercial facilities, critical manufacturing, energy, and healthcare and public health sectors. It also sees action on a global basis.
No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.
Honeywell has released firmware update packages for all affected products.
Honeywell recommends users with potentially affected products take the following steps to protect themselves:
• Update firmware of vulnerable devices per this security notification
• Isolate their system from the Internet or create additional layers of defense to their system from the Internet by placing the affected hardware behind a firewall or into a DMZ
• If remote connections to the network are required, consider using a VPN or other means to ensure secure remote connections into the network where the device is located
More information on this issue can be found in Honeywell Security Notification SN 2019-09-04 01.