6.5
CVE-2025-2522
- EPSS 0.04%
- Published 10.07.2025 20:11:43
- Last modified 15.07.2025 13:14:49
- Source psirt@honeywell.com
- Teams watchlist Login
- Open Login
The Honeywell Experion PKS and OneWireless WDM contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior. Honeywell also recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. The affected Experion PKS products are C300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are 520.1 before 520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorHoneywell
≫
Product
C300 PCNT02
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
C300 PCNT05
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
FIM4
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
FIM8
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
UOC
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
CN100
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
HCA
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
C300PM
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
C200E
Default Statusunaffected
Version <=
520.2 TCU9
Version
520.1
Status
affected
Version <=
530 TCU3
Version
530
Status
affected
VendorHoneywell
≫
Product
Wireless Device Manager
Default Statusunaffected
Version <=
322.4
Version
322.1
Status
affected
Version <=
330.3
Version
330.1
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.117 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
psirt@honeywell.com | 6.5 | 3.9 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
|
CWE-226 Sensitive Information in Resource Not Removed Before Reuse
The product releases a resource such as memory or a file so that it can be made available for reuse, but it does not clear or "zeroize" the information contained in the resource before the product performs a critical state transition or makes the resource available for reuse by other entities.