CVE-2025-2523

Honeywell · Honeywell Experion PKS and OneWireless WDM

A critical integer underflow vulnerability in Honeywell Experion PKS and OneWireless WDM systems could allow an unauthenticated, remote attacker to disrupt industrial processes or execute arbitrary co.

Executive summary

A critical integer underflow vulnerability in Honeywell Experion PKS and OneWireless WDM systems could allow an unauthenticated, remote attacker to disrupt industrial processes or execute arbitrary code.

Vulnerability

An integer underflow vulnerability exists within the Control Data Access (CDA) component of the affected software. An unauthenticated attacker could potentially exploit this flaw, which may lead to a buffer overflow, resulting in a denial of service or arbitrary code execution.

Business impact

With a CVSS score of 9.4 (Critical), a successful exploit could have severe consequences for industrial control environments. An attacker could disrupt or halt critical operational processes, leading to significant production loss, equipment damage, or potential safety incidents. The high score reflects the low attack complexity and lack of authentication required to compromise the system.

Remediation

Immediate Action: Administrators must update the affected Honeywell Experion PKS and OneWireless WDM products to the latest patched version as specified by the vendor to eliminate the vulnerability.

Proactive Monitoring: Security teams should actively monitor network traffic for anomalous activity targeting the Control Data Access (CDA) service and regularly review system and access logs for any signs of exploitation.

Compensating Controls: Implement an Intrusion Prevention System (IPS) with rules to detect and block exploitation attempts. Ensure proper network segmentation is in place to limit access to sensitive industrial control components from untrusted networks.

Exploitation status

Public Exploit Available: Not Publicly Known

Analyst recommendation

Given the critical severity and the potential for significant operational disruption, this vulnerability poses a substantial risk to affected organizations. We strongly recommend that administrators prioritize the deployment of the vendor-supplied updates immediately. All affected Honeywell systems should be patched without delay to mitigate this threat.