{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T05:10:33.076","vulnerabilities":[{"cve":{"id":"CVE-2025-2522","sourceIdentifier":"psirt@honeywell.com","published":"2025-07-10T21:15:27.363","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Honeywell Experion PKS and OneWireless WDM \n\n contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior.\n\nHoneywell also recommends updating to the most recent version of \n\nHoneywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. \n\nThe affected Experion PKS products are \n\n\n\nC300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E.  The Experion PKS versions affected are 520.1 before \n\n520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3."},{"lang":"es","value":"Honeywell Experion PKS y OneWireless WDM presentan una vulnerabilidad de información confidencial en los recursos en el componente Control Data Access (CDA). Un atacante podría explotar esta vulnerabilidad, lo que podría provocar una manipulación del canal de comunicación y la reutilización del búfer, lo que podría provocar un comportamiento incorrecto del sistema. Honeywell también recomienda actualizar a la versión más reciente de Honeywell Experion PKS: 520.2 TCU9 HF1 y 530.1 TCU3 HF1, y de OneWireless: 322.5 y 331.1. Los productos Experion PKS afectados son C300, FIM4, FIM8, UOC, CN100, HCA, C300PM y C200E. Las versiones de Experion PKS afectadas son la 520.1 anterior a la 520.2 TCU9 HF1 y la 530 anterior a la 530 TCU3. Las versiones afectadas de OneWireless WDM son 322.1 a 322.4 y 330.1 a 330.3."}],"metrics":{"cvssMetricV31":[{"source":"psirt@honeywell.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5}]},"weaknesses":[{"source":"psirt@honeywell.com","type":"Secondary","description":[{"lang":"en","value":"CWE-226"}]}],"references":[{"url":"https://process.honeywell.com/","source":"psirt@honeywell.com"}]}}]}