CVE-2023-51603

8.8 HIGH

📋 TL;DR

This vulnerability in Honeywell Saia PG5 Controls Suite allows remote attackers to execute arbitrary code by tricking users into opening malicious CAB files. The flaw exists in how the software validates file paths during CAB file parsing, enabling directory traversal attacks. Affected users are those running vulnerable versions of the software who open untrusted CAB files.

💻 Affected Systems

Products:
  • Honeywell Saia PG5 Controls Suite
Versions: All versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the CAB file parsing functionality within the PG5 Controls Suite software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system in the context of the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or arbitrary code execution on the user's workstation, potentially leading to credential theft, data exfiltration, or installation of persistent malware.

🟢

If Mitigated

Limited impact with proper application whitelisting and user training preventing malicious file execution, though system remains vulnerable to targeted attacks.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening malicious file) but the vulnerability itself is straightforward to exploit once a malicious CAB file is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Honeywell security advisory for specific patched version

Vendor Advisory: https://www.honeywell.com/us/en/support/security/cyber-security-updates

Restart Required: Yes

Instructions:

1. Check Honeywell security advisory for latest patch information
2. Download the updated version from Honeywell's official portal
3. Install the update following vendor instructions
4. Restart the system as required

🔧 Temporary Workarounds

Restrict CAB file execution

windows

Block execution of CAB files through application control policies

Using Windows AppLocker or similar: Create rule to block .cab file execution

User awareness training

all

Train users to avoid opening untrusted CAB files

🧯 If You Can't Patch

  • Implement strict application whitelisting to prevent execution of unauthorized software
  • Segment networks to limit lateral movement potential from compromised systems

🔍 How to Verify

Check if Vulnerable:

Check installed version of Honeywell Saia PG5 Controls Suite against patched version in vendor advisory

Check Version:

Check program version through Windows Control Panel > Programs and Features or via the application's About dialog

Verify Fix Applied:

Verify installation of patched version and test CAB file parsing functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from CAB file parsing components
  • File system writes to unexpected directories from PG5 processes
  • Security event logs showing unauthorized file access attempts

Network Indicators:

  • Outbound connections from PG5 processes to suspicious external IPs
  • Unusual network traffic patterns following CAB file processing

SIEM Query:

Process creation where parent process contains 'pg5' and command line contains '.cab' or path traversal patterns

🔗 References

📤 Share & Export