Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-3946— Incorrect response generation during FTEB protocol processing

CVSS 8.2 · High EPSS 0.51% · P67
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-3946

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Incorrect response generation during FTEB protocol processing
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Honeywell Experion PKS and OneWireless WDM contains a Deployment of Wrong Handler vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to Input Data Manipulation, which could result in incorrect handling of packets leading to remote code execution. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
错误句柄的实施
Source: NVD (National Vulnerability Database)
Vulnerability Title
Honeywell Experion PKS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Honeywell Experion PKS是美国霍尼韦尔(Honeywell)公司的一个过程自动化系统。 Honeywell Experion PKS 520.1至520.2 TCU9和530至530 TCU3版本和OneWireless WDM 322.1至322.4和330.1至330.3版本存在安全漏洞,该漏洞源于错误处理程序部署,可能导致远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
HoneywellC300 PCNT02 520.1 ~ 520.2 TCU9 -
HoneywellC300 PCNT05 520.1 ~ 520.2 TCU9 -
HoneywellFIM4 520.1 ~ 520.2 TCU9 -
HoneywellFIM8 520.1 ~ 520.2 TCU9 -
HoneywellUOC 520.1 ~ 520.2 TCU9 -
HoneywellCN100 520.1 ~ 520.2 TCU9 -
HoneywellHCA 520.1 ~ 520.2 TCU9 -
HoneywellC300PM 520.1 ~ 520.2 TCU9 -
HoneywellC200E 520.1 ~ 520.2 TCU9 -
HoneywellWireless Device Manager 322.1 ~ 322.4 -

II. Public POCs for CVE-2025-3946

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-3946

登录查看更多情报信息。

Same Patch Batch · Honeywell · 2025-07-10 · 6 CVEs total

CVE-2025-25239.4 CRITICALLack of buffer clearing before reuse may result in incorrect system behavior.
CVE-2025-25218.6 HIGHLack of indexes’ validation against buffer borders leads to remote code execution.
CVE-2025-39478.2 HIGHInteger underflow during processing of short network packets in CDA FTEB responder
CVE-2025-25207.5 HIGHDereferencing of an uninitialized pointer leads to denial of service.
CVE-2025-25226.5 MEDIUMLack of buffer clearing before reuse may result in incorrect system behavior.

IV. Related Vulnerabilities

V. Comments for CVE-2025-3946

No comments yet


Leave a comment