9.8
CRITICAL
CVE-2019-18226
Honeywell equIP series and Performance series IP Cameras Authentication Replay Attack Vulnerability
Description

Honeywell equIP series and Performance series IP cameras and recorders, A vulnerability exists in the affected products where IP cameras and recorders have a potential replay attack vulnerability as a weak authentication method is retained for compatibility with legacy products.

INFO

Published Date :

Oct. 31, 2019, 10:15 p.m.

Last Modified :

Sept. 29, 2020, 12:14 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2019-18226 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Honeywell h2w2pc1m_firmware
2 Honeywell h2w2per3_firmware
3 Honeywell h2w4per3_firmware
4 Honeywell h4w2per2_firmware
5 Honeywell h4w2per3_firmware
6 Honeywell h4w4per2_firmware
7 Honeywell h4w4per3_firmware
8 Honeywell h4w8pr2_firmware
9 Honeywell hbd2per1_firmware
10 Honeywell hbw2per1_firmware
11 Honeywell hbw2per2_firmware
12 Honeywell hbw4per1_firmware
13 Honeywell hbw4per2_firmware
14 Honeywell hbw4pgr1_firmware
15 Honeywell hbw8pr2_firmware
16 Honeywell hed2per3_firmware
17 Honeywell hew2per2_firmware
18 Honeywell hew2per3_firmware
19 Honeywell hew4per2b_firmware
20 Honeywell hew4per3_firmware
21 Honeywell hew4per3b_firmware
22 Honeywell hdzp252di_firmware
23 Honeywell hdzp304di_firmware
24 Honeywell hpw2p1_firmware
25 Honeywell h2w2gr1_firmware
26 Honeywell h3w2gr1v_firmware
27 Honeywell h3w4gr1v_firmware
28 Honeywell h3w2gr1_firmware
29 Honeywell h3w2gr2_firmware
30 Honeywell h3w4gr1_firmware
31 Honeywell h4l2gr1v_firmware
32 Honeywell h4w2gr1_firmware
33 Honeywell h4w2gr1v_firmware
34 Honeywell h4w4gr1v_firmware
35 Honeywell h4l2gr1_firmware
36 Honeywell h4w2gr2_firmware
37 Honeywell h4w4gr1_firmware
38 Honeywell h4l6gr2_firmware
39 Honeywell hm4l8gr1_firmware
40 Honeywell h4d8gr1_firmware
41 Honeywell hbl2gr1v_firmware
42 Honeywell hbw2gr1v_firmware
43 Honeywell hbw2gr3v_firmware
44 Honeywell hbw4gr1v_firmware
45 Honeywell hbl6gr2_firmware
46 Honeywell hmbl8gr1_firmware
47 Honeywell hbd8gr1_firmware
48 Honeywell hfd6gr1_firmware
49 Honeywell hfd8gr1_firmware
50 Honeywell hdz302liw_firmware
51 Honeywell hdz302lik_firmware
52 Honeywell hdz302de_firmware
53 Honeywell hdz302d_firmware
54 Honeywell hdz302din-c1_firmware
55 Honeywell hdz302din-s1_firmware
56 Honeywell hepz302w0_firmware
57 Honeywell hcl2gv_firmware
58 Honeywell hcl2g_firmware
59 Honeywell hcw2g_firmware
60 Honeywell hcw4g_firmware
61 Honeywell hcd8g_firmware
62 Honeywell hsw2g1_firmware
63 Honeywell hswb2g1_firmware
64 Honeywell hcw2gv_firmware
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2019-18226.

URL Resource
https://www.us-cert.gov/ics/advisories/icsa-19-304-04 Third Party Advisory US Government Resource

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2019-18226 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2019-18226 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Reanalysis by [email protected]

    Sep. 29, 2020

    Action Type Old Value New Value
    Removed CPE Configuration AND OR *cpe:2.3:o:honeywell:hcw2gv_firmware:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:honeweyll:h4w2per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeweyll:h4w2per2:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:honeywell:h4w2per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w2per2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcw2gv_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcw2gv:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 27, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:honeywell:hcw2gv:_:*:*:*:*:*:*:* OR *cpe:2.3:h:honeywell:hcw2gv:-:*:*:*:*:*:*:*
  • Initial Analysis by [email protected]

    Nov. 05, 2019

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.us-cert.gov/ics/advisories/icsa-19-304-04 No Types Assigned https://www.us-cert.gov/ics/advisories/icsa-19-304-04 Third Party Advisory, US Government Resource
    Added CWE NIST CWE-294
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h2w2pc1m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h2w2pc1m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h2w2per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h2w2per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h2w4per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h2w4per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeweyll:h4w2per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeweyll:h4w2per2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w2per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w2per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w4per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w4per2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w4per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w4per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w8pr2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w8pr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbd2per1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbd2per1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw2per1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw2per1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw2per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw2per2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw4per1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw4per1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw4per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw4per2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw4pgr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw4pgr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw8pr2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw8pr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hed2per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hed2per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hew2per2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hew2per2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hew2per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hew2per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hew4per2b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hew4per2b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hew4per3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hew4per3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hew4per3b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hew4per3b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hew4per2b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hew4per2b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdzp252di_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdzp252di:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdzp304di_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdzp304di:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hpw2p1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hpw2p1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h2w2gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h2w2gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h3w2gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h3w2gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h3w4gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h3w4gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h3w2gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h3w2gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h3w2gr2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h3w2gr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h3w4gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h3w4gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4l2gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4l2gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w2gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w2gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w2gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w2gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w4gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w4gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4l2gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4l2gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w2gr2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w2gr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4w4gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4w4gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4l6gr2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4l6gr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hm4l8gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hm4l8gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:h4d8gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:h4d8gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbl2gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbl2gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw2gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw2gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw2gr3v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw2gr3v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbw4gr1v_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbw4gr1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbl6gr2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbl6gr2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hmbl8gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hmbl8gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hbd8gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hbd8gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hfd6gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hfd6gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hfd8gr1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hfd8gr1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdz302liw_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdz302liw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdz302lik_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdz302lik:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdz302de_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdz302de:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdz302d_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdz302d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdz302din-c1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdz302din-c1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hdz302din-s1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hdz302din-s1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hepz302w0_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hepz302w0:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcl2gv_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcl2gv:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcw2gv_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcw2gv:_:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcl2g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcl2g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcw2g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcw2g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcw4g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcw4g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hcd8g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hcd8g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hsw2g1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hsw2g1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:honeywell:hswb2g1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:honeywell:hswb2g1:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.21 }} 0.00%

score

0.57479

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability