CVE-2025-3947 (GCVE-0-2025-3947)
Vulnerability from cvelistv5
Published
2025-07-10 20:19
Modified
2025-08-04 19:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-191 - Integer Underflow (Wrap or Wraparound)
Summary
The Honeywell Experion PKS contains an Integer Underflow
vulnerability
in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to
Input Data Manipulation, which could result in improper integer data value checking during subtraction leading to a denial of service.
Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1.
The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Honeywell | C300 PCNT02 |
Version: 520.1 ≤ 520.2 TCU9 Version: 530 ≤ 530 TCU3 |
|||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-3947", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-10T20:34:52.670505Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-10T20:35:01.787Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "C300 PCNT02", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "C300 PCNT05", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "FIM4", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "FIM8", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "UOC", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "CN100", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "HCA", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "C300PM", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "C200E", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Demid Uzenkov and Kirill Kutaev (Positive Technologies)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Honeywell Experion PKS contains an Integer Underflow \n\nvulnerability \n\nin the component Control\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eData Access (CDA). An attacker could potentially exploit this vulnerability, leading to \n\nInput Data Manipulation, which could result in improper\u0026nbsp;integer data value checking during subtraction leading to a denial of service.\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003c/span\u003e\u003c/span\u003e\n\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1.\u003cbr\u003e\u003cbr\u003eThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.\n\n\u003cbr\u003e" } ], "value": "The Honeywell Experion PKS contains an Integer Underflow \n\nvulnerability \n\nin the component Control\u00a0Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to \n\nInput Data Manipulation, which could result in improper\u00a0integer data value checking during subtraction leading to a denial of service.\n\n\n\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1.\n\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3." } ], "impacts": [ { "capecId": "CAPEC-153", "descriptions": [ { "lang": "en", "value": "CAPEC-153 Input Data Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191 Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-04T19:46:31.982Z", "orgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d", "shortName": "Honeywell" }, "references": [ { "url": "https://process.honeywell.com/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Integer underflow during processing of short network packets in CDA FTEB responder", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d", "assignerShortName": "Honeywell", "cveId": "CVE-2025-3947", "datePublished": "2025-07-10T20:19:13.991Z", "dateReserved": "2025-04-25T15:21:22.614Z", "dateUpdated": "2025-08-04T19:46:31.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-3947\",\"sourceIdentifier\":\"psirt@honeywell.com\",\"published\":\"2025-07-10T21:15:28.547\",\"lastModified\":\"2025-07-15T13:14:49.980\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Honeywell Experion PKS contains an Integer Underflow \\n\\nvulnerability \\n\\nin the component Control\u00a0Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to \\n\\nInput Data Manipulation, which could result in improper\u00a0integer data value checking during subtraction leading to a denial of service.\\n\\n\\n\\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1.\\n\\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.\"},{\"lang\":\"es\",\"value\":\"Honeywell Experion PKS contiene una vulnerabilidad de subdesbordamiento de enteros en el componente Control Data Access (CDA). Un atacante podr\u00eda explotar esta vulnerabilidad, lo que podr\u00eda provocar la manipulaci\u00f3n de datos de entrada, lo que podr\u00eda resultar en una comprobaci\u00f3n incorrecta de valores enteros durante la resta, lo que a su vez podr\u00eda provocar una denegaci\u00f3n de servicio. Honeywell recomienda actualizar a la versi\u00f3n m\u00e1s reciente de Honeywell Experion PKS: 520.2 TCU9 HF1 y 530.1 TCU3 HF1. Los productos Experion PKS afectados son C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM y C200E. Las versiones de Experion PKS afectadas son de la 520.1 a la 520.2 TCU9 y de la 530 a la 530 TCU3.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@honeywell.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"psirt@honeywell.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-191\"}]}],\"references\":[{\"url\":\"https://process.honeywell.com/\",\"source\":\"psirt@honeywell.com\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-3947\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-10T20:34:52.670505Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-10T20:34:58.599Z\"}}], \"cna\": {\"title\": \"Integer underflow during processing of short network packets in CDA FTEB responder\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Demid Uzenkov and Kirill Kutaev (Positive Technologies)\"}], \"impacts\": [{\"capecId\": \"CAPEC-153\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-153 Input Data Manipulation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Honeywell\", \"product\": \"C300 PCNT02\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"C300 PCNT05\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"FIM4\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"FIM8\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"UOC\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"CN100\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"HCA\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"C300PM\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"C200E\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://process.honeywell.com/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The Honeywell Experion PKS contains an Integer Underflow \\n\\nvulnerability \\n\\nin the component Control\\u00a0Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to \\n\\nInput Data Manipulation, which could result in improper\\u00a0integer data value checking during subtraction leading to a denial of service.\\n\\n\\n\\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1.\\n\\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The Honeywell Experion PKS contains an Integer Underflow \\n\\nvulnerability \\n\\nin the component Control\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eData Access (CDA). An attacker could potentially exploit this vulnerability, leading to \\n\\nInput Data Manipulation, which could result in improper\u0026nbsp;integer data value checking during subtraction leading to a denial of service.\u003cbr\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cbr\u003e\u003c/span\u003e\u003c/span\u003e\\n\\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1.\u003cbr\u003e\u003cbr\u003eThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-191\", \"description\": \"CWE-191 Integer Underflow (Wrap or Wraparound)\"}]}], \"providerMetadata\": {\"orgId\": \"0dc86260-d7e3-4e81-ba06-3508e030ce8d\", \"shortName\": \"Honeywell\", \"dateUpdated\": \"2025-08-04T19:46:31.982Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-3947\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-04T19:46:31.982Z\", \"dateReserved\": \"2025-04-25T15:21:22.614Z\", \"assignerOrgId\": \"0dc86260-d7e3-4e81-ba06-3508e030ce8d\", \"datePublished\": \"2025-07-10T20:19:13.991Z\", \"assignerShortName\": \"Honeywell\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…