The Honeywell Experion PKS contains an Uninitialized Variable in the common Epic Platform Analyzer (EPA) communications. An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which results in a dereferencing of an uninitialized pointer leading to a denial of service.
Honeywell recommends updating to the most recent version of
Honeywell Experion PKS: 520.2 TCU9 HF1and 530.1 TCU3 HF1. The affected Experion PKS products are
C300 PCNT02, EHB, EHPM, ELMM, Classic ENIM, ETN, FIM4, FIM8, PGM, and RFIM. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://process.honeywell.com/ |
![]() ![]() |
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Thu, 10 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 10 Jul 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Honeywell Experion PKS contains an Uninitialized Variable in the common Epic Platform Analyzer (EPA) communications. An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which results in a dereferencing of an uninitialized pointer leading to a denial of service. Honeywell recommends updating to the most recent version of Honeywell Experion PKS: 520.2 TCU9 HF1and 530.1 TCU3 HF1. The affected Experion PKS products are C300 PCNT02, EHB, EHPM, ELMM, Classic ENIM, ETN, FIM4, FIM8, PGM, and RFIM. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. | |
Title | Dereferencing of an uninitialized pointer leads to denial of service. | |
Weaknesses | CWE-457 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Honeywell
Published: 2025-07-10T19:54:35.250Z
Updated: 2025-07-10T20:33:30.482Z
Reserved: 2025-03-19T13:57:27.868Z
Link: CVE-2025-2520

Updated: 2025-07-10T20:33:27.000Z

Status : Awaiting Analysis
Published: 2025-07-10T20:15:24.127
Modified: 2025-07-15T13:14:49.980
Link: CVE-2025-2520

No data.