Honeywell Saia Burgess PG5 PCD Authentication Bypass Using an Alternate Path or Channel (CVE-2022-30319, CVE-2022-30320)

high Tenable OT Security Plugin ID 500655


The remote OT asset may be affected by a vulnerability.


The device may be vulnerable to flaws related to OT:ICEFALL. These vulnerabilities identify the insecure-by-design nature of OT devices and may not have a clear remediation path. As such, Nessus is unable to test specifically for these vulnerabilities but has identified the device to be one that was listed in the OT:ICEFALL report. Ensure your OT deployments follow best practices including accurate inventory, separation of environments, and monitoring. This plugin will trigger on any device seen by Tenable.OT that matches a family or model listed in the OT:ICEFALL report.

Note: All findings need to be manually verified based on the advisory from the vendor, once released.

This plugin only works with Tenable.ot. Please visit for more information.


The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at

Honeywell recommends users with affected products and unsupported products take the following steps to protect themselves:

- Apply product updates as available.
- Follow guidance in the product security manual to ensure isolation of network segments upon which automation controllers reside.
- Ensure adequate security controls are in place between OT and IT network segments.
- Disable unnecessary accounts and services.
- Follow a least privilege approach and restrict system access to authorized personnel.
- Apply defense-in-depth strategies.
- Log and monitor network traffic for suspicious activity.

See Also

Plugin Details

Severity: High

ID: 500655

Version: 1.7

Type: remote

Family: Tenable.ot

Published: 6/22/2022

Updated: 3/4/2024

Supported Sensors: Tenable OT Security

Risk Information


Risk Factor: Medium

Score: 5.2


Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:N

CVSS Score Source: CVE-2022-30319


Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:saia_burgess_controls:pcd_controllers

Required KB Items: Tenable.ot/Saia

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 6/22/2022

Reference Information

CVE: CVE-2022-30319, CVE-2022-30320