8.6
CVE-2025-2521
- EPSS 0.21%
- Published 10.07.2025 20:08:04
- Last modified 15.07.2025 13:14:49
- Source psirt@honeywell.com
- Teams watchlist Login
- Open Login
The Honeywell Experion PKS and OneWireless WDM contains a Memory Buffer vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to an Overread Buffers, which could result in improper index validation against buffer borders leading to remote code execution. Honeywell recommends updating to the most recent version of Honeywell Experion PKS: 520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorHoneywell
≫
Product
C300 PCNT02
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
C300 PCNT05
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
FIM4
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
FIM8
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
UOC
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
CN100
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
HCA
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
C300PM
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
C200E
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
Wireless Device Manager
Default Statusunaffected
Version <=
322.4
Version
322.1
Status
affected
Version <=
330.3
Version
330.1
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.21% | 0.435 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
psirt@honeywell.com | 8.6 | 3.9 | 4.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.