{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-3946","assignerOrgId":"0dc86260-d7e3-4e81-ba06-3508e030ce8d","state":"PUBLISHED","assignerShortName":"Honeywell","dateReserved":"2025-04-25T15:21:21.740Z","datePublished":"2025-07-10T20:16:54.743Z","dateUpdated":"2025-08-04T19:46:15.112Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"C300 PCNT02","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"C300 PCNT05","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"FIM4","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"FIM8","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"UOC","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"CN100","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"HCA","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"C300PM","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"C200E","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["OneWireless"],"product":"Wireless Device Manager","vendor":"Honeywell","versions":[{"lessThanOrEqual":"322.4","status":"affected","version":"322.1","versionType":"semver"},{"lessThanOrEqual":"330.3","status":"affected","version":"330.1","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Demid Uzenkov and Kirill Kutaev (Positive Technologies)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The Honeywell Experion PKS \n\nand OneWireless WDM\n\ncontains a Deployment of Wrong Handler\n\n \n\nvulnerability \n\nin the component Control&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to \n\nInput Data Manipulation, \n\n which could result in incorrect handling of packets leading to remote code execution.<span style=\"background-color: rgb(255, 255, 255);\"><br><br>\n\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.<br><br>The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E.  The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.</span></span><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.\n\n<br></span>"}],"value":"The Honeywell Experion PKS \n\nand OneWireless WDM\n\ncontains a Deployment of Wrong Handler\n\n \n\nvulnerability \n\nin the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to \n\nInput Data Manipulation, \n\n which could result in incorrect handling of packets leading to remote code execution.\n\n\n\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\n\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E.  The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3."}],"impacts":[{"capecId":"CAPEC-153","descriptions":[{"lang":"en","value":"CAPEC-153 Input Data Manipulation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-430","description":"CWE-430 Deployment of Wrong Handler","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"0dc86260-d7e3-4e81-ba06-3508e030ce8d","shortName":"Honeywell","dateUpdated":"2025-08-04T19:46:15.112Z"},"references":[{"url":"https://process.honeywell.com/"}],"source":{"discovery":"EXTERNAL"},"title":"Incorrect response generation during FTEB protocol processing","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-10T20:35:19.798404Z","id":"CVE-2025-3946","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-10T20:35:28.409Z"}}]}}