CVE-2025-2523 (GCVE-0-2025-2523)
Vulnerability from cvelistv5
Published
2025-07-10 20:15
Modified
2025-08-04 19:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-191 - Integer Underflow (Wrap or Wraparound)
Summary
The Honeywell Experion PKS
and OneWireless WDM
contains an Integer Underflow
vulnerability
in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in a failure during subtraction allowing remote code execution.
Honeywell recommends updating to the most recent version of
Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.
The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Honeywell | C300 PCNT02 |
Version: 520.1 ≤ 520.2 TCU9 Version: 530 ≤ 530 TCU3 |
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-2523",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-10T20:35:45.591675Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-10T20:35:53.232Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "C300 PCNT02",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "C300 PCNT05",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "FIM4",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "FIM8",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "UOC",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "CN100",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "HCA",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "C300PM",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "C200E",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"OneWireless"
],
"product": "Wireless Device Manager",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "322.4",
"status": "affected",
"version": "322.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "330.3",
"status": "affected",
"version": "330.1",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Demid Uzenkov and Kirill Kutaev (Positive Technologies)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Honeywell Experion PKS \n\n and OneWireless WDM \n\ncontains an Integer Underflow \n\nvulnerability \n\nin the component Control\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eData Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in a failure\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;during subtraction allowing remote code execution.\u003c/span\u003e\u003c/span\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003cbr\u003eHoneywell recommends updating to the most recent version of \n\nHoneywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.\n\n\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "The Honeywell Experion PKS \n\n and OneWireless WDM \n\ncontains an Integer Underflow \n\nvulnerability \n\nin the component Control\u00a0Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in a failure\u00a0during subtraction allowing remote code execution.\n\n\n\nHoneywell recommends updating to the most recent version of \n\nHoneywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\n\n\n\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3."
}
],
"impacts": [
{
"capecId": "CAPEC-216",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-216 Communication Channel Manipulation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-191",
"description": "CWE-191 Integer Underflow (Wrap or Wraparound)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-04T19:45:51.105Z",
"orgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d",
"shortName": "Honeywell"
},
"references": [
{
"url": "https://process.honeywell.com/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Lack of buffer clearing before reuse may result in incorrect system behavior.",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d",
"assignerShortName": "Honeywell",
"cveId": "CVE-2025-2523",
"datePublished": "2025-07-10T20:15:32.600Z",
"dateReserved": "2025-03-19T13:57:31.419Z",
"dateUpdated": "2025-08-04T19:45:51.105Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-2523\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-10T20:35:45.591675Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-10T20:35:50.254Z\"}}], \"cna\": {\"title\": \"Lack of buffer clearing before reuse may result in incorrect system behavior.\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Demid Uzenkov and Kirill Kutaev (Positive Technologies)\"}], \"impacts\": [{\"capecId\": \"CAPEC-216\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-216 Communication Channel Manipulation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Honeywell\", \"product\": \"C300 PCNT02\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"C300 PCNT05\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"FIM4\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"FIM8\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"UOC\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"CN100\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"HCA\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"C300PM\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"C200E\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"Wireless Device Manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"322.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"322.4\"}, {\"status\": \"affected\", \"version\": \"330.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"330.3\"}], \"platforms\": [\"OneWireless\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://process.honeywell.com/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The Honeywell Experion PKS \\n\\n and OneWireless WDM \\n\\ncontains an Integer Underflow \\n\\nvulnerability \\n\\nin the component Control\\u00a0Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in a failure\\u00a0during subtraction allowing remote code execution.\\n\\n\\n\\nHoneywell recommends updating to the most recent version of \\n\\nHoneywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\\n\\n\\n\\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The Honeywell Experion PKS \\n\\n and OneWireless WDM \\n\\ncontains an Integer Underflow \\n\\nvulnerability \\n\\nin the component Control\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eData Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in a failure\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;during subtraction allowing remote code execution.\u003c/span\u003e\u003c/span\u003e\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cbr\u003e\u003cbr\u003eHoneywell recommends updating to the most recent version of \\n\\nHoneywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\\n\\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.\\n\\n\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-191\", \"description\": \"CWE-191 Integer Underflow (Wrap or Wraparound)\"}]}], \"providerMetadata\": {\"orgId\": \"0dc86260-d7e3-4e81-ba06-3508e030ce8d\", \"shortName\": \"Honeywell\", \"dateUpdated\": \"2025-08-04T19:45:51.105Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-2523\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-04T19:45:51.105Z\", \"dateReserved\": \"2025-03-19T13:57:31.419Z\", \"assignerOrgId\": \"0dc86260-d7e3-4e81-ba06-3508e030ce8d\", \"datePublished\": \"2025-07-10T20:15:32.600Z\", \"assignerShortName\": \"Honeywell\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…