Honeywell XL Web Controller Directory Traversal Vulnerabilities
10 Jun. 2015
Directory traversal vulnerability in the FTP server on Honeywell Excel Web XL1000C50 52 I/O, XL1000C100 104 I/O, XL1000C500 300 I/O, XL1000C1000 600 I/O, XL1000C50U 52 I/O UUKL, XL1000C100U 104 I/O UUKL, XL1000C500U 300 I/O UUKL, and XL1000C1000U 600 I/O UUKL controllers before 2.04.01 allows remote attackers to read files under the web root, and consequently obtain administrative login access, via a crafted pathname.
* Honeywell Excel Web UUKL controllers before 2.04.01
* Honeywell Excel Web UUKL controllers after 2.04.01
An attacker may use this vulnerability to generate a valid login for an administrative user on the Honeywell XLWeb controller giving the attacker full administrator access to the system. The XLWEB application effectively becomes an entry point into the network where it is located. Impact to individual organizations depends on many factors that are unique to each organization. NCCIC/ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation