CVE-2025-3946
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-10

Last updated on: 2025-07-15

Assigner: Honeywell International Inc.

Description
The Honeywell Experion PKS and OneWireless WDM contains a Deployment of Wrong Handler vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to Input Data Manipulation, which could result in incorrect handling of packets leading to remote code execution. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-10
Last Modified
2025-07-15
Generated
2026-05-07
AI Q&A
2025-07-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 11 associated CPEs
Vendor Product Version / Range
honeywell experion_pks 520.2
honeywell onewireless 322.1
honeywell onewireless 322.4
honeywell experion_pks 520.1
honeywell experion_pks 530
honeywell onewireless 330.1
honeywell experion_pks 530.1_tcu3_hf1
honeywell onewireless 331.1
honeywell onewireless 330.3
honeywell experion_pks 520.2_tcu9_hf1
honeywell onewireless 322.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-430 The wrong "handler" is assigned to process an object.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Honeywell Experion PKS and OneWireless WDM products within the Control Data Access (CDA) component. It is caused by the deployment of a wrong handler, which an attacker could exploit to manipulate input data. This manipulation can lead to incorrect handling of packets and potentially result in remote code execution.


How can this vulnerability impact me? :

Exploitation of this vulnerability could allow an attacker to manipulate input data and execute remote code on affected systems. This could lead to unauthorized control over the system, disruption of operations, or other malicious activities impacting system integrity and availability.


What immediate steps should I take to mitigate this vulnerability?

Honeywell recommends updating to the most recent versions of Honeywell Experion PKS (520.2 TCU9 HF1 and 530.1 TCU3 HF1) and OneWireless WDM (322.5 and 331.1) to mitigate this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart