CVE-2025-2522
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-10

Last updated on: 2025-07-15

Assigner: Honeywell International Inc.

Description
The Honeywell Experion PKS and OneWireless WDM contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior. Honeywell also recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.  The affected Experion PKS products are C300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are 520.1 before 520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-10
Last Modified
2025-07-15
Generated
2026-05-07
AI Q&A
2025-07-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
honeywell onewireless 322.1
honeywell experion_pks 520.1
honeywell experion_pks 530
honeywell onewireless 330.1
honeywell onewireless 331.1
honeywell experion_pks 520.2_tcu9_hf1
honeywell onewireless 322.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-226 The product releases a resource such as memory or a file so that it can be made available for reuse, but it does not clear or "zeroize" the information contained in the resource before the product performs a critical state transition or makes the resource available for reuse by other entities.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Honeywell Experion PKS and OneWireless WDM involves sensitive information exposure in the Control Data Access (CDA) component. An attacker could exploit it to manipulate communication channels, potentially causing buffer reuse that may lead to incorrect system behavior.


How can this vulnerability impact me? :

Exploitation of this vulnerability could allow an attacker to manipulate communication channels and cause buffer reuse, which may result in incorrect system behavior. This could affect the reliability and security of the affected Honeywell systems.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, Honeywell recommends updating to the most recent versions of the affected products: Honeywell Experion PKS versions 520.2 TCU9 HF1 and 530.1 TCU3 HF1, and OneWireless WDM versions 322.5 and 331.1.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart