CVE-2023-51599

8.8 HIGH

📋 TL;DR

This vulnerability in Honeywell Saia PG5 Controls Suite allows remote attackers to execute arbitrary code by exploiting a directory traversal flaw in ZIP file parsing. Attackers can achieve remote code execution by tricking users into opening malicious ZIP files. Organizations using Honeywell Saia PG5 Controls Suite for building automation and control systems are affected.

💻 Affected Systems

Products:
  • Honeywell Saia PG5 Controls Suite
Versions: All versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Primarily affects Windows installations used for building automation system programming and configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code with current user privileges, potentially leading to lateral movement, data theft, or disruption of building control systems.

🟠

Likely Case

Attackers gain initial foothold on systems running the vulnerable software, enabling further exploitation and potential ransomware deployment in industrial control environments.

🟢

If Mitigated

Limited impact due to network segmentation, proper user privilege restrictions, and security controls preventing malicious file execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires user interaction (opening malicious file) but exploitation is straightforward once the malicious ZIP is processed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Honeywell security advisory for specific patched version

Vendor Advisory: https://www.honeywell.com/us/en/support/security/cyber-security-notifications

Restart Required: Yes

Instructions:

1. Check Honeywell security advisory for specific patch version
2. Download and install the latest version of Saia PG5 Controls Suite
3. Restart affected systems
4. Verify installation and functionality

🔧 Temporary Workarounds

Restrict ZIP file processing

windows

Block or restrict processing of ZIP files in the Saia PG5 Controls Suite environment

User awareness training

all

Train users to avoid opening untrusted ZIP files and to verify file sources

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Saia PG5 systems from critical networks
  • Apply principle of least privilege to user accounts running the software

🔍 How to Verify

Check if Vulnerable:

Check Saia PG5 Controls Suite version against Honeywell's patched version in security advisory

Check Version:

Check version in Saia PG5 Controls Suite application or installation directory

Verify Fix Applied:

Verify installed version matches or exceeds the patched version specified by Honeywell

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in ZIP processing
  • Unexpected process execution from Saia PG5 directory
  • Failed file path validation attempts

Network Indicators:

  • Unexpected outbound connections from Saia PG5 systems
  • File transfers to/from Saia PG5 workstations

SIEM Query:

Process creation events from Saia PG5 executable with suspicious command-line arguments

🔗 References

📤 Share & Export