CVE-2025-3946 (GCVE-0-2025-3946)
Vulnerability from cvelistv5 – Published: 2025-07-10 20:16 – Updated: 2025-08-04 19:46
VLAI?
Summary
The Honeywell Experion PKS
and OneWireless WDM
contains a Deployment of Wrong Handler
vulnerability
in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to
Input Data Manipulation,
which could result in incorrect handling of packets leading to remote code execution.
Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.
The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.
Severity ?
8.2 (High)
CWE
- CWE-430 - Deployment of Wrong Handler
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Honeywell | C300 PCNT02 |
Affected:
520.1 , ≤ 520.2 TCU9
(semver)
Affected: 530 , ≤ 530 TCU3 (semver) |
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Demid Uzenkov and Kirill Kutaev (Positive Technologies)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-3946",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-10T20:35:19.798404Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-10T20:35:28.409Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "C300 PCNT02",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "C300 PCNT05",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "FIM4",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "FIM8",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "UOC",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "CN100",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "HCA",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "C300PM",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Experion PKS"
],
"product": "C200E",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "520.2 TCU9",
"status": "affected",
"version": "520.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "530 TCU3",
"status": "affected",
"version": "530",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"OneWireless"
],
"product": "Wireless Device Manager",
"vendor": "Honeywell",
"versions": [
{
"lessThanOrEqual": "322.4",
"status": "affected",
"version": "322.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "330.3",
"status": "affected",
"version": "330.1",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Demid Uzenkov and Kirill Kutaev (Positive Technologies)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Honeywell Experion PKS \n\nand OneWireless WDM\n\ncontains a Deployment of Wrong Handler\n\n \n\nvulnerability \n\nin the component Control\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eData Access (CDA). An attacker could potentially exploit this vulnerability, leading to \n\nInput Data Manipulation, \n\n which could result in incorrect handling of packets leading to remote code execution.\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003cbr\u003e\n\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\u003cbr\u003e\u003cbr\u003eThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.\u003c/span\u003e\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.\n\n\u003cbr\u003e\u003c/span\u003e"
}
],
"value": "The Honeywell Experion PKS \n\nand OneWireless WDM\n\ncontains a Deployment of Wrong Handler\n\n \n\nvulnerability \n\nin the component Control\u00a0Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to \n\nInput Data Manipulation, \n\n which could result in incorrect handling of packets leading to remote code execution.\n\n\n\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\n\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.\u00a0The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3."
}
],
"impacts": [
{
"capecId": "CAPEC-153",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-153 Input Data Manipulation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-430",
"description": "CWE-430 Deployment of Wrong Handler",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-04T19:46:15.112Z",
"orgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d",
"shortName": "Honeywell"
},
"references": [
{
"url": "https://process.honeywell.com/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Incorrect response generation during FTEB protocol processing",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d",
"assignerShortName": "Honeywell",
"cveId": "CVE-2025-3946",
"datePublished": "2025-07-10T20:16:54.743Z",
"dateReserved": "2025-04-25T15:21:21.740Z",
"dateUpdated": "2025-08-04T19:46:15.112Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-3946\",\"sourceIdentifier\":\"psirt@honeywell.com\",\"published\":\"2025-07-10T21:15:28.390\",\"lastModified\":\"2025-07-15T13:14:49.980\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Honeywell Experion PKS \\n\\nand OneWireless WDM\\n\\ncontains a Deployment of Wrong Handler\\n\\n \\n\\nvulnerability \\n\\nin the component Control\u00a0Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to \\n\\nInput Data Manipulation, \\n\\n which could result in incorrect handling of packets leading to remote code execution.\\n\\n\\n\\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\\n\\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.\u00a0The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.\"},{\"lang\":\"es\",\"value\":\"Honeywell Experion PKS y OneWireless WDM presentan una vulnerabilidad de implementaci\u00f3n de controlador err\u00f3neo en el componente Control Data Access (CDA). Un atacante podr\u00eda explotar esta vulnerabilidad, lo que podr\u00eda provocar la manipulaci\u00f3n de datos de entrada, lo que a su vez podr\u00eda resultar en un manejo incorrecto de paquetes y la ejecuci\u00f3n remota de c\u00f3digo. Honeywell recomienda actualizar a la versi\u00f3n m\u00e1s reciente de Honeywell Experion PKS: 520.2 TCU9 HF1 y 530.1 TCU3 HF1, y OneWireless: 322.5 y 331.1. Los productos Experion PKS afectados son C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM y C200E. Las versiones de Experion PKS afectadas son de la 520.1 a la 520.2 TCU9 y de la 530 a la 530 TCU3. Las versiones afectadas de OneWireless WDM son 322.1 a 322.4 y 330.1 a 330.3.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@honeywell.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"psirt@honeywell.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-430\"}]}],\"references\":[{\"url\":\"https://process.honeywell.com/\",\"source\":\"psirt@honeywell.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-3946\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-10T20:35:19.798404Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-10T20:35:23.923Z\"}}], \"cna\": {\"title\": \"Incorrect response generation during FTEB protocol processing\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Demid Uzenkov and Kirill Kutaev (Positive Technologies)\"}], \"impacts\": [{\"capecId\": \"CAPEC-153\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-153 Input Data Manipulation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Honeywell\", \"product\": \"C300 PCNT02\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"C300 PCNT05\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"FIM4\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"FIM8\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"UOC\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"CN100\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"HCA\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"C300PM\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"C200E\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU9\"}, {\"status\": \"affected\", \"version\": \"530\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"530 TCU3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"Wireless Device Manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"322.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"322.4\"}, {\"status\": \"affected\", \"version\": \"330.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"330.3\"}], \"platforms\": [\"OneWireless\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://process.honeywell.com/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The Honeywell Experion PKS \\n\\nand OneWireless WDM\\n\\ncontains a Deployment of Wrong Handler\\n\\n \\n\\nvulnerability \\n\\nin the component Control\\u00a0Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to \\n\\nInput Data Manipulation, \\n\\n which could result in incorrect handling of packets leading to remote code execution.\\n\\n\\n\\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\\n\\nThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.\\u00a0The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The Honeywell Experion PKS \\n\\nand OneWireless WDM\\n\\ncontains a Deployment of Wrong Handler\\n\\n \\n\\nvulnerability \\n\\nin the component Control\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eData Access (CDA). An attacker could potentially exploit this vulnerability, leading to \\n\\nInput Data Manipulation, \\n\\n which could result in incorrect handling of packets leading to remote code execution.\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cbr\u003e\u003cbr\u003e\\n\\nHoneywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\u003cbr\u003e\u003cbr\u003eThe affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.\u003c/span\u003e\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.\\n\\n\u003cbr\u003e\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-430\", \"description\": \"CWE-430 Deployment of Wrong Handler\"}]}], \"providerMetadata\": {\"orgId\": \"0dc86260-d7e3-4e81-ba06-3508e030ce8d\", \"shortName\": \"Honeywell\", \"dateUpdated\": \"2025-08-04T19:46:15.112Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-3946\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-04T19:46:15.112Z\", \"dateReserved\": \"2025-04-25T15:21:21.740Z\", \"assignerOrgId\": \"0dc86260-d7e3-4e81-ba06-3508e030ce8d\", \"datePublished\": \"2025-07-10T20:16:54.743Z\", \"assignerShortName\": \"Honeywell\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…