Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-3947

Summary
Assigner-Honeywell
Assigner Org ID-0dc86260-d7e3-4e81-ba06-3508e030ce8d
Published At-10 Jul, 2025 | 20:19
Updated At-04 Aug, 2025 | 19:46
Rejected At-
Credits

Integer underflow during processing of short network packets in CDA FTEB responder

The Honeywell Experion PKS contains an Integer Underflow vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to Input Data Manipulation, which could result in improper integer data value checking during subtraction leading to a denial of service. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Honeywell
Assigner Org ID:0dc86260-d7e3-4e81-ba06-3508e030ce8d
Published At:10 Jul, 2025 | 20:19
Updated At:04 Aug, 2025 | 19:46
Rejected At:
▼CVE Numbering Authority (CNA)
Integer underflow during processing of short network packets in CDA FTEB responder

The Honeywell Experion PKS contains an Integer Underflow vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to Input Data Manipulation, which could result in improper integer data value checking during subtraction leading to a denial of service. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.

Affected Products
Vendor
Honeywell International Inc.Honeywell
Product
C300 PCNT02
Platforms
  • Experion PKS
Default Status
unaffected
Versions
Affected
  • From 520.1 through 520.2 TCU9 (semver)
  • From 530 through 530 TCU3 (semver)
Vendor
Honeywell International Inc.Honeywell
Product
C300 PCNT05
Platforms
  • Experion PKS
Default Status
unaffected
Versions
Affected
  • From 520.1 through 520.2 TCU9 (semver)
  • From 530 through 530 TCU3 (semver)
Vendor
Honeywell International Inc.Honeywell
Product
FIM4
Platforms
  • Experion PKS
Default Status
unaffected
Versions
Affected
  • From 520.1 through 520.2 TCU9 (semver)
  • From 530 through 530 TCU3 (semver)
Vendor
Honeywell International Inc.Honeywell
Product
FIM8
Platforms
  • Experion PKS
Default Status
unaffected
Versions
Affected
  • From 520.1 through 520.2 TCU9 (semver)
  • From 530 through 530 TCU3 (semver)
Vendor
Honeywell International Inc.Honeywell
Product
UOC
Platforms
  • Experion PKS
Default Status
unaffected
Versions
Affected
  • From 520.1 through 520.2 TCU9 (semver)
  • From 530 through 530 TCU3 (semver)
Vendor
Honeywell International Inc.Honeywell
Product
CN100
Platforms
  • Experion PKS
Default Status
unaffected
Versions
Affected
  • From 520.1 through 520.2 TCU9 (semver)
  • From 530 through 530 TCU3 (semver)
Vendor
Honeywell International Inc.Honeywell
Product
HCA
Platforms
  • Experion PKS
Default Status
unaffected
Versions
Affected
  • From 520.1 through 520.2 TCU9 (semver)
  • From 530 through 530 TCU3 (semver)
Vendor
Honeywell International Inc.Honeywell
Product
C300PM
Platforms
  • Experion PKS
Default Status
unaffected
Versions
Affected
  • From 520.1 through 520.2 TCU9 (semver)
  • From 530 through 530 TCU3 (semver)
Vendor
Honeywell International Inc.Honeywell
Product
C200E
Platforms
  • Experion PKS
Default Status
unaffected
Versions
Affected
  • From 520.1 through 520.2 TCU9 (semver)
  • From 530 through 530 TCU3 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-191CWE-191 Integer Underflow (Wrap or Wraparound)
Type: CWE
CWE ID: CWE-191
Description: CWE-191 Integer Underflow (Wrap or Wraparound)
Metrics
VersionBase scoreBase severityVector
3.18.2HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-153CAPEC-153 Input Data Manipulation
CAPEC ID: CAPEC-153
Description: CAPEC-153 Input Data Manipulation
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Demid Uzenkov and Kirill Kutaev (Positive Technologies)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://process.honeywell.com/
N/A
Hyperlink: https://process.honeywell.com/
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@honeywell.com
Published At:10 Jul, 2025 | 21:15
Updated At:15 Jul, 2025 | 13:14

The Honeywell Experion PKS contains an Integer Underflow vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to Input Data Manipulation, which could result in improper integer data value checking during subtraction leading to a denial of service. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.2HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Type: Secondary
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-191Secondarypsirt@honeywell.com
CWE ID: CWE-191
Type: Secondary
Source: psirt@honeywell.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://process.honeywell.com/psirt@honeywell.com
N/A
Hyperlink: https://process.honeywell.com/
Source: psirt@honeywell.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

2Records found

CVE-2025-3946
Matching Score-8
Assigner-Honeywell International Inc.
ShareView Details
Matching Score-8
Assigner-Honeywell International Inc.
CVSS Score-8.2||HIGH
EPSS-0.21% / 43.49%
||
7 Day CHG~0.00%
Published-10 Jul, 2025 | 20:16
Updated-04 Aug, 2025 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect response generation during FTEB protocol processing

The Honeywell Experion PKS and OneWireless WDM contains a Deployment of Wrong Handler vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to Input Data Manipulation, which could result in incorrect handling of packets leading to remote code execution. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.

Action-Not Available
Vendor-Honeywell International Inc.
Product-C200EUOCC300PMWireless Device ManagerC300 PCNT05HCAC300 PCNT02FIM8CN100FIM4
CWE ID-CWE-430
Deployment of Wrong Handler
CVE-2025-2523
Matching Score-6
Assigner-Honeywell International Inc.
ShareView Details
Matching Score-6
Assigner-Honeywell International Inc.
CVSS Score-9.4||CRITICAL
EPSS-0.20% / 42.30%
||
7 Day CHG~0.00%
Published-10 Jul, 2025 | 20:15
Updated-04 Aug, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lack of buffer clearing before reuse may result in incorrect system behavior.

The Honeywell Experion PKS and OneWireless WDM contains an Integer Underflow vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in a failure during subtraction allowing remote code execution. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.

Action-Not Available
Vendor-Honeywell International Inc.
Product-C200EUOCC300PMWireless Device ManagerC300 PCNT05HCAC300 PCNT02FIM8CN100FIM4
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
Details not found