Honeywell Midas Gas Detector Vulnerabilities
Honeywell Midas gas detectors (version 1.13b1 and earlier, Midas Black version 2.13b1 and earlier) contain path traversal and cleartext transmission vulnerabilities. An attacker with network access can read sensitive files and configuration data from the detector without authentication (CWE-22) and intercept or modify unencrypted communications (CWE-319). These vulnerabilities allow an attacker to disable gas detection functionality, modify alarm thresholds, or prevent the detector from alerting operators to hazardous gas conditions. Honeywell has not released patches for these products and does not plan to fix these vulnerabilities.
- Network access to the Midas detector on its communication port
- No credentials required
- Detector must be reachable from the attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/970578c8-d41d-4f3c-b57e-3e81df3e65e1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.