Skip to main content

CVE-2025-2523: CWE-191 Integer Underflow (Wrap or Wraparound) in Honeywell C300 PCNT02

Critical
VulnerabilityCVE-2025-2523cvecve-2025-2523cwe-191
Published: Thu Jul 10 2025 (07/10/2025, 20:15:32 UTC)
Source: CVE Database V5
Vendor/Project: Honeywell
Product: C300 PCNT02

Description

The Honeywell Experion PKS and OneWireless WDM contains an Integer Underflow vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in a failure during subtraction allowing remote code execution. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.

AI-Powered Analysis

AILast updated: 08/05/2025, 00:37:04 UTC

Technical Analysis

CVE-2025-2523 is a critical integer underflow vulnerability (CWE-191) identified in Honeywell's Experion PKS and OneWireless WDM industrial control system components, specifically within the Control Data Access (CDA) module. The affected products include Experion PKS versions 520.1 through 520.2 TCU9 and 530 through 530 TCU3, and OneWireless WDM versions 322.1 through 322.4 and 330.1 through 330.3. The impacted hardware includes C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The vulnerability arises from an integer underflow condition during a subtraction operation, which can be exploited remotely without authentication or user interaction. This flaw can lead to communication channel manipulation, potentially allowing an attacker to execute arbitrary code remotely. The CVSS v3.1 base score is 9.4, reflecting high impact on integrity and availability with low attack complexity and no privileges required. Honeywell recommends updating to the latest patched versions: Experion PKS 520.2 TCU9 HF1, 530.1 TCU3 HF1, and OneWireless 322.5 and 331.1. No known exploits are currently reported in the wild, but the critical nature and ease of exploitation make timely patching essential. This vulnerability poses a significant risk to industrial control systems that manage critical infrastructure processes, potentially leading to operational disruption, safety hazards, and data integrity compromise.

Potential Impact

For European organizations, especially those operating critical infrastructure such as energy, manufacturing, water treatment, and transportation sectors, this vulnerability presents a severe risk. Honeywell's Experion PKS and OneWireless systems are widely deployed in industrial environments across Europe. Exploitation could lead to unauthorized remote code execution, resulting in manipulation or disruption of communication channels within control systems. This could cause process failures, safety incidents, production downtime, and potential cascading effects on supply chains. The integrity and availability of industrial operations could be compromised, leading to financial losses, regulatory penalties, and damage to reputation. Given the criticality of these systems in national infrastructure, successful exploitation could also have broader societal impacts. The lack of required privileges or user interaction lowers the barrier for attackers, increasing the likelihood of targeted attacks or opportunistic exploitation by threat actors.

Mitigation Recommendations

European organizations should prioritize immediate patching by upgrading to the Honeywell recommended versions: Experion PKS 520.2 TCU9 HF1, 530.1 TCU3 HF1, and OneWireless 322.5 and 331.1. In parallel, implement network segmentation to isolate affected control systems from general IT networks and limit exposure to external networks. Employ strict access controls and monitoring on communication channels to detect anomalous activities indicative of exploitation attempts. Utilize intrusion detection and prevention systems tailored for industrial protocols to identify manipulation attempts. Conduct thorough audits of existing Honeywell system versions and maintain an up-to-date asset inventory. Establish incident response plans specific to industrial control system compromises. Additionally, restrict remote access to these systems using VPNs with multi-factor authentication and monitor logs for unusual behavior. Regularly train operational technology (OT) staff on this vulnerability and best practices for secure system management. Finally, collaborate with Honeywell support for guidance and verify patch integrity before deployment to avoid operational disruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Honeywell
Date Reserved
2025-03-19T13:57:31.419Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6870230ba83201eaaca9b87e

Added to database: 7/10/2025, 8:31:07 PM

Last enriched: 8/5/2025, 12:37:04 AM

Last updated: 8/23/2025, 7:49:39 AM

Views: 80

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats