CVE-2023-51601

6.5 MEDIUM
XXE

📋 TL;DR

This XXE vulnerability in Honeywell Saia PG5 Controls Suite allows attackers to disclose sensitive information by tricking users into opening malicious XML files. The vulnerability affects systems running the vulnerable software where users process untrusted XML documents. User interaction is required as victims must open a malicious file or visit a malicious page.

💻 Affected Systems

Products:
  • Honeywell Saia PG5 Controls Suite
Versions: Versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects installations where users process XML files from untrusted sources. The vulnerability is in the XML parser component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disclosure of sensitive system files, configuration data, or network information accessible to the application process, potentially leading to further system compromise.

🟠

Likely Case

Information disclosure of local files accessible to the application, potentially including configuration files, logs, or other sensitive data.

🟢

If Mitigated

Limited or no impact if proper input validation and XML parser hardening are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening malicious file). XXE vulnerabilities are well-understood with established exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Honeywell security advisory for specific patched version

Vendor Advisory: https://www.honeywell.com/us/en/support/security/cyber-security-notifications

Restart Required: Yes

Instructions:

1. Check Honeywell security advisory for specific patch version
2. Download and install the latest version of Saia PG5 Controls Suite
3. Restart affected systems
4. Verify the patch is applied correctly

🔧 Temporary Workarounds

Disable XXE in XML parser

all

Configure XML parser to disable external entity processing

Set XML parser properties: FEATURE_SECURE_PROCESSING=true, disallow-doctype-decl=true

Input validation and filtering

all

Implement strict input validation for XML files, rejecting files with DOCTYPE declarations or external entity references

🧯 If You Can't Patch

  • Restrict user permissions to minimize accessible files
  • Implement application whitelisting to prevent execution of unauthorized applications
  • Educate users about risks of opening untrusted XML files
  • Monitor for suspicious file access patterns

🔍 How to Verify

Check if Vulnerable:

Check if Saia PG5 Controls Suite version is vulnerable by comparing with Honeywell's patched version list

Check Version:

Check application version in About dialog or installation directory

Verify Fix Applied:

Test with a safe XXE payload to confirm parser rejects external entity references

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from Saia PG5 process
  • XML parsing errors with external entity references
  • Unexpected network connections from the application

Network Indicators:

  • Outbound connections to unusual URIs during XML processing
  • Data exfiltration patterns

SIEM Query:

process_name:"Saia PG5" AND (event_type:"file_access" OR event_type:"network_connection")

🔗 References

📤 Share & Export