6.5

CVE-2025-2522

The Honeywell Experion PKS and OneWireless WDM 

 contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior.

Honeywell also recommends updating to the most recent version of 

Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. 

The affected Experion PKS products are 



C300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E.  The Experion PKS versions affected are 520.1 before 

520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerHoneywell
Produkt C300 PCNT02
Default Statusunaffected
Version <= 520.2 TCU9
Version 520.1
Status affected
Version <= 530 TCU3
Version 530
Status affected
HerstellerHoneywell
Produkt C300 PCNT05
Default Statusunaffected
Version <= 520.2 TCU9
Version 520.1
Status affected
Version <= 530 TCU3
Version 530
Status affected
HerstellerHoneywell
Produkt FIM4
Default Statusunaffected
Version <= 520.2 TCU9
Version 520.1
Status affected
Version <= 530 TCU3
Version 530
Status affected
HerstellerHoneywell
Produkt FIM8
Default Statusunaffected
Version <= 520.2 TCU9
Version 520.1
Status affected
Version <= 530 TCU3
Version 530
Status affected
HerstellerHoneywell
Produkt UOC
Default Statusunaffected
Version <= 520.2 TCU9
Version 520.1
Status affected
Version <= 530 TCU3
Version 530
Status affected
HerstellerHoneywell
Produkt CN100
Default Statusunaffected
Version <= 520.2 TCU9
Version 520.1
Status affected
Version <= 530 TCU3
Version 530
Status affected
HerstellerHoneywell
Produkt HCA
Default Statusunaffected
Version <= 520.2 TCU9
Version 520.1
Status affected
Version <= 530 TCU3
Version 530
Status affected
HerstellerHoneywell
Produkt C300PM
Default Statusunaffected
Version <= 520.2 TCU9
Version 520.1
Status affected
Version <= 530 TCU3
Version 530
Status affected
HerstellerHoneywell
Produkt C200E
Default Statusunaffected
Version <= 520.2 TCU9
Version 520.1
Status affected
Version <= 530 TCU3
Version 530
Status affected
HerstellerHoneywell
Produkt Wireless Device Manager
Default Statusunaffected
Version <= 322.4
Version 322.1
Status affected
Version <= 330.3
Version 330.1
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.117
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@honeywell.com 6.5 3.9 2.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CWE-226 Sensitive Information in Resource Not Removed Before Reuse

The product releases a resource such as memory or a file so that it can be made available for reuse, but it does not clear or "zeroize" the information contained in the resource before the product performs a critical state transition or makes the resource available for reuse by other entities.