CVE-2025-2523
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-10

Last updated on: 2025-07-15

Assigner: Honeywell International Inc.

Description
The Honeywell Experion PKS and OneWireless WDM contains an Integer Underflow vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in a failure during subtraction allowing remote code execution. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-10
Last Modified
2025-07-15
Generated
2026-05-07
AI Q&A
2025-07-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
honeywell experion_pks 520.2_tcu9_hf1
honeywell experion_pks 530.1_tcu3_hf1
honeywell onewireless 331.1
honeywell onewireless 322.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-191 The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Integer Underflow in the Control Data Access (CDA) component of Honeywell Experion PKS and OneWireless WDM. An attacker could exploit this flaw, causing a failure during a subtraction operation, which may lead to remote code execution through manipulation of the communication channel.


How can this vulnerability impact me? :

Exploitation of this vulnerability could allow an attacker to execute remote code on affected systems, potentially leading to unauthorized control, data manipulation, or disruption of services.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should update to the most recent versions recommended by Honeywell: Experion PKS versions 520.2 TCU9 HF1 and 530.1 TCU3 HF1, and OneWireless versions 322.5 and 331.1.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart