{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-3947","assignerOrgId":"0dc86260-d7e3-4e81-ba06-3508e030ce8d","state":"PUBLISHED","assignerShortName":"Honeywell","dateReserved":"2025-04-25T15:21:22.614Z","datePublished":"2025-07-10T20:19:13.991Z","dateUpdated":"2025-08-04T19:46:31.982Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"C300 PCNT02","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"C300 PCNT05","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"FIM4","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"FIM8","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"UOC","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"CN100","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"HCA","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"C300PM","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]},{"defaultStatus":"unaffected","platforms":["Experion PKS"],"product":"C200E","vendor":"Honeywell","versions":[{"lessThanOrEqual":"520.2 TCU9","status":"affected","version":"520.1","versionType":"semver"},{"lessThanOrEqual":"530 TCU3","status":"affected","version":"530","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Demid Uzenkov and Kirill Kutaev (Positive Technologies)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The Honeywell Experion PKS contains an Integer Underflow \n\nvulnerability \n\nin the component Control&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to \n\nInput Data Manipulation, which could result in improper&nbsp;integer data value checking during subtraction leading to a denial of service.<br><span style=\"background-color: rgb(255, 255, 255);\"><br></span></span>\n\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1.<br><br>The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E.  The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.\n\n<br>"}],"value":"The Honeywell Experion PKS contains an Integer Underflow \n\nvulnerability \n\nin the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to \n\nInput Data Manipulation, which could result in improper integer data value checking during subtraction leading to a denial of service.\n\n\n\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1.\n\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E.  The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3."}],"impacts":[{"capecId":"CAPEC-153","descriptions":[{"lang":"en","value":"CAPEC-153 Input Data Manipulation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-191","description":"CWE-191 Integer Underflow (Wrap or Wraparound)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"0dc86260-d7e3-4e81-ba06-3508e030ce8d","shortName":"Honeywell","dateUpdated":"2025-08-04T19:46:31.982Z"},"references":[{"url":"https://process.honeywell.com/"}],"source":{"discovery":"EXTERNAL"},"title":"Integer underflow during processing of short network packets in CDA FTEB responder","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-10T20:34:52.670505Z","id":"CVE-2025-3947","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-10T20:35:01.787Z"}}]}}