{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T15:45:03.453","vulnerabilities":[{"cve":{"id":"CVE-2025-3946","sourceIdentifier":"psirt@honeywell.com","published":"2025-07-10T21:15:28.390","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Honeywell Experion PKS \n\nand OneWireless WDM\n\ncontains a Deployment of Wrong Handler\n\n \n\nvulnerability \n\nin the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to \n\nInput Data Manipulation, \n\n which could result in incorrect handling of packets leading to remote code execution.\n\n\n\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\n\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E.  The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3."},{"lang":"es","value":"Honeywell Experion PKS y OneWireless WDM presentan una vulnerabilidad de implementación de controlador erróneo en el componente Control Data Access (CDA). Un atacante podría explotar esta vulnerabilidad, lo que podría provocar la manipulación de datos de entrada, lo que a su vez podría resultar en un manejo incorrecto de paquetes y la ejecución remota de código. Honeywell recomienda actualizar a la versión más reciente de Honeywell Experion PKS: 520.2 TCU9 HF1 y 530.1 TCU3 HF1, y OneWireless: 322.5 y 331.1. Los productos Experion PKS afectados son C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM y C200E. Las versiones de Experion PKS afectadas son de la 520.1 a la 520.2 TCU9 y de la 530 a la 530 TCU3. Las versiones afectadas de OneWireless WDM son 322.1 a 322.4 y 330.1 a 330.3."}],"metrics":{"cvssMetricV31":[{"source":"psirt@honeywell.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.2}]},"weaknesses":[{"source":"psirt@honeywell.com","type":"Secondary","description":[{"lang":"en","value":"CWE-430"}]}],"references":[{"url":"https://process.honeywell.com/","source":"psirt@honeywell.com"}]}}]}