AID
Automation
Information Directory
HomeCVE FeedBrands
AID
Automation Information Directory
CVE data sourced from NIST NVD · Documentation links from official sources
Home›Brands›Honeywell
HO
Platform

Honeywell

Experion PKS DCS, ControlEdge PLCs, UniSim Design, and Forge ICS cybersecurity platform for process industries.

https://www.honeywell.com/us/en/industries/industrial-automation →
105
Total CVEs
0
Resources
26
CRIT
45
HIGH
31
MED
2
LOW
CVEsCVEsSpecsTech SpecsDocsTech DocsImplImplementationsExamplesExamples
26 / 105
CVE-2026-3611CRITICAL

The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentication in its factory-default configuration. With no user module configured, security is disabled by design and the system operates under a System Guest (level 100) context, granting read/write privileges to any party able to reach the HTTP interface. Authentication controls are only enforced after a web user is created via U.htm, which dynamically enables the user module. Because this function is accessible prior to authentication, a remote user can create a new account with administrative read/write permissions enabling the user module and imposing authentication under attacker-controlled credentials. This action can effectively lock legitimate operators out of local and web-based configuration and administration.

Mar 12, 2026
10.0
CVE-2021-38397CRITICAL

Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.

Oct 28, 2022
10.0
CVE-2025-2605CRITICAL

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Honeywell MB-Secure allows Privilege Abuse. This issue affects MB-Secure: from V11.04 before V12.53 and MB-Secure PRO from V01.06 before V03.09.Honeywell also recommends updating to the most recent version of this product.

May 2, 2025
9.9
CVE-2023-3710CRITICAL

Improper Input Validation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Command Injection.This issue affects PM43 versions prior to P10.19.050004. Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).

Sep 12, 2023
9.9
CVE-2023-25770CRITICAL

Controller DoS may occur due to buffer overflow when an error is generated in response to a specially crafted message. See Honeywell Security Notification for recommendations on upgrading and versioning.

Jul 13, 2023
9.8
CVE-2023-25178CRITICAL

Controller may be loaded with malicious firmware which could enable remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning.

Jul 13, 2023
9.8
CVE-2023-25078CRITICAL

Server or Console Station DoS due to heap overflow occurring during the handling of a specially crafted message for a specific configuration operation.  See Honeywell Security Notification for recommendations on upgrading and versioning.

Jul 13, 2023
9.8
CVE-2023-24480CRITICAL

Controller DoS due to stack overflow when decoding a message from the server.  See Honeywell Security Notification for recommendations on upgrading and versioning.

Jul 13, 2023
9.8
CVE-2023-23585CRITICAL

Experion server DoS due to heap overflow occurring during the handling of a specially crafted message for a specific configuration operation.  See Honeywell Security Notification for recommendations on upgrading and versioning.

Jul 13, 2023
9.8
CVE-2022-30318CRITICAL

Honeywell ControlEdge through R151.1 uses Hard-coded Credentials. According to FSCT-2022-0056, there is a Honeywell ControlEdge hardcoded credentials issue. The affected components are characterized as: SSH. The potential impact is: Remote code execution, manipulate configuration, denial of service. The Honeywell ControlEdge PLC and RTU product line exposes an SSH service on port 22/TCP. Login as root to this service is permitted and credentials for the root user are hardcoded without automatically changing them upon first commissioning. The credentials for the SSH service are hardcoded in the firmware. The credentials grant an attacker access to a root shell on the PLC/RTU, allowing for remote code execution, configuration manipulation and denial of service.

Aug 31, 2022
9.8
CVE-2022-30315CRITICAL

Honeywell Experion PKS Safety Manager (SM and FSC) through 2022-05-06 has Insufficient Verification of Data Authenticity. According to FSCT-2022-0053, there is a Honeywell Experion PKS Safety Manager insufficient logic security controls issue. The affected components are characterized as: Honeywell FSC runtime (FSC-CPU, QPP), Honeywell Safety Builder. The potential impact is: Remote Code Execution, Denial of Service. The Honeywell Experion PKS Safety Manager family of safety controllers utilize the unauthenticated Safety Builder protocol (FSCT-2022-0051) for engineering purposes, including downloading projects and control logic to the controller. Control logic is downloaded to the controller on a block-by-block basis. The logic that is downloaded consists of FLD code compiled to native machine code for the CPU module (which applies to both the Safety Manager and FSC families). Since this logic does not seem to be cryptographically authenticated, it allows an attacker capable of triggering a logic download to execute arbitrary machine code on the controller's CPU module in the context of the runtime. While the researchers could not verify this in detail, the researchers believe that the microprocessor underpinning the FSC and Safety Manager CPU modules is incapable of offering memory protection or privilege separation capabilities which would give an attacker full control of the CPU module. There is no authentication on control logic downloaded to the controller. Memory protection and privilege separation capabilities for the runtime are possibly lacking. The researchers confirmed the issues in question on Safety Manager R145.1 and R152.2 but suspect the issue affects all FSC and SM controllers and associated Safety Builder versions regardless of software or firmware revision. An attacker who can communicate with a Safety Manager controller via the Safety Builder protocol can execute arbitrary code without restrictions on the CPU module, allowing for covert manipulation of control operations and implanting capabilities similar to the TRITON malware (MITRE ATT&CK software ID S1009). A mitigating factor with regards to some, but not all, of the above functionality is that these require the Safety Manager physical keyswitch to be in the right position.

Jul 28, 2022
9.8
CVE-2021-39363CRITICAL

Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow a video replay attack after ARP cache poisoning has been achieved.

Feb 24, 2022
9.8
CVE-2020-6974CRITICAL

Honeywell Notifier Web Server (NWS) Version 3.50 is vulnerable to a path traversal attack, which allows an attacker to bypass access to restricted directories. Honeywell has released a firmware update to address the problem.

Apr 7, 2020
9.8
CVE-2019-18226CRITICAL

Honeywell equIP series and Performance series IP cameras and recorders, A vulnerability exists in the affected products where IP cameras and recorders have a potential replay attack vulnerability as a weak authentication method is retained for compatibility with legacy products.

Oct 31, 2019
9.8
CVE-2014-9186CRITICAL

A file inclusion vulnerability exists in the confd.exe module in Honeywell Experion PKS R40x before R400.6, R41x before R410.6, and R43x before R430.2, which could lead to accepting an arbitrary file into the function, and potential information disclosure or remote code execution. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.

Apr 8, 2019
9.8
CVE-2014-5435CRITICAL

An arbitrary memory write vulnerability exists in the dual_onsrv.exe module in Honeywell Experion PKS R40x before R400.6, R41x before R410.6, and R43x before R430.2, that could lead to possible remote code execution or denial of service. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.

Apr 8, 2019
9.8
CVE-2014-9189CRITICAL

Multiple stack-based buffer overflow vulnerabilities were found in Honeywell Experion PKS all versions prior to R400.6, all versions prior to R410.6, and all versions prior to R430.2 modules that could lead to possible remote code execution, dynamic memory corruption, or denial of service. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.

Mar 25, 2019
9.8
CVE-2014-9187CRITICAL

Multiple heap-based buffer overflow vulnerabilities exist in Honeywell Experion PKS all versions prior to R400.6, all versions prior to R410.6, and all versions prior to R430.2 modules, which could lead to possible remote code execution or denial of service. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.

Mar 25, 2019
9.8
CVE-2017-5140CRITICAL

An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and XLWeb 500 XLWebExe-1-02-08 and prior. Password is stored in clear text.

Feb 13, 2017
9.8
CVE-2017-5139CRITICAL

An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and XLWeb 500 XLWebExe-1-02-08 and prior. Any user is able to disclose a password by accessing a specific URL, because of Plaintext Storage of a Password.

Feb 13, 2017
9.8
CVE-2025-2523CRITICAL

The Honeywell Experion PKS and OneWireless WDM contains an Integer Underflow vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in a failure during subtraction allowing remote code execution. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.

Jul 10, 2025
9.4
CVE-2023-5389CRITICAL

An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 

Jan 30, 2024
9.1
CVE-2021-38395CRITICAL

Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to improper neutralization of special elements in output, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.

Oct 28, 2022
9.1
CVE-2022-30317CRITICAL

Honeywell Experion LX through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0055, there is a Honeywell Experion LX Control Data Access (CDA) EpicMo protocol with unauthenticated functionality issue. The affected components are characterized as: Honeywell Control Data Access (CDA) EpicMo (55565/TCP). The potential impact is: Firmware manipulation, Denial of service. The Honeywell Experion LX Distributed Control System (DCS) utilizes the Control Data Access (CDA) EpicMo protocol (55565/TCP) for device diagnostics and maintenance purposes. This protocol does not have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality. There is no authentication functionality on the protocol in question. An attacker capable of invoking the protocols' functionalities could issue firmware download commands potentially allowing for firmware manipulation and reboot devices causing denial of service.

Aug 31, 2022
9.1
CVE-2020-6972CRITICAL

In Notifier Web Server (NWS) Version 3.50 and earlier, the Honeywell Fire Web Server’s authentication may be bypassed by a capture-replay attack from a web browser.

Mar 24, 2020
9.1
CVE-2017-5142CRITICAL

An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and XLWeb 500 XLWebExe-1-02-08 and prior. A user with low privileges is able to open and change the parameters by accessing a specific URL because of Improper Privilege Management.

Feb 13, 2017
9.1
CVE ID ⇅Severity ↓CVSS ⇅DescriptionPublished ⇅
CVE-2026-3611CRITICAL
10.0
The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentica…Mar 12, 2026›
CVE-2021-38397CRITICAL
10.0
Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to unrestricted file up…Oct 28, 2022›
CVE-2025-2605CRITICAL
9.9
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerabi…May 2, 2025›
CVE-2023-3710CRITICAL
9.9
Improper Input Validation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) …Sep 12, 2023›
CVE-2023-25770CRITICAL
9.8
Controller DoS may occur due to buffer overflow when an error is generated in response to a speciall…Jul 13, 2023›
CVE-2023-25178CRITICAL
9.8
Controller may be loaded with malicious firmware which could enable remote code execution. See Honey…Jul 13, 2023›
CVE-2023-25078CRITICAL
9.8
Server or Console Station DoS due to heap overflow occurring during the handling of a specially craf…Jul 13, 2023›
CVE-2023-24480CRITICAL
9.8
Controller DoS due to stack overflow when decoding a message from the server.  See Honeywell Securi…Jul 13, 2023›
CVE-2023-23585CRITICAL
9.8
Experion server DoS due to heap overflow occurring during the handling of a specially crafted messag…Jul 13, 2023›
CVE-2022-30318CRITICAL
9.8
Honeywell ControlEdge through R151.1 uses Hard-coded Credentials. According to FSCT-2022-0056, there…Aug 31, 2022›
CVE-2022-30315CRITICAL
9.8
Honeywell Experion PKS Safety Manager (SM and FSC) through 2022-05-06 has Insufficient Verification …Jul 28, 2022›
CVE-2021-39363CRITICAL
9.8
Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow a video replay attack after …Feb 24, 2022›
CVE-2020-6974CRITICAL
9.8
Honeywell Notifier Web Server (NWS) Version 3.50 is vulnerable to a path traversal attack, which all…Apr 7, 2020›
CVE-2019-18226CRITICAL
9.8
Honeywell equIP series and Performance series IP cameras and recorders, A vulnerability exists in th…Oct 31, 2019›
CVE-2014-9186CRITICAL
9.8
A file inclusion vulnerability exists in the confd.exe module in Honeywell Experion PKS R40x before …Apr 8, 2019›
CVE-2014-5435CRITICAL
9.8
An arbitrary memory write vulnerability exists in the dual_onsrv.exe module in Honeywell Experion PK…Apr 8, 2019›
CVE-2014-9189CRITICAL
9.8
Multiple stack-based buffer overflow vulnerabilities were found in Honeywell Experion PKS all versio…Mar 25, 2019›
CVE-2014-9187CRITICAL
9.8
Multiple heap-based buffer overflow vulnerabilities exist in Honeywell Experion PKS all versions pri…Mar 25, 2019›
CVE-2017-5140CRITICAL
9.8
An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and…Feb 13, 2017›
CVE-2017-5139CRITICAL
9.8
An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and…Feb 13, 2017›
CVE-2025-2523CRITICAL
9.4
The Honeywell Experion PKS and OneWireless WDM contains an Integer Underflow vulnerability …Jul 10, 2025›
CVE-2023-5389CRITICAL
9.1
An attacker could potentially exploit this vulnerability, leading to the ability to modify files on…Jan 30, 2024›
CVE-2021-38395CRITICAL
9.1
Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to improper neutralizat…Oct 28, 2022›
CVE-2022-30317CRITICAL
9.1
Honeywell Experion LX through 2022-05-06 has Missing Authentication for a Critical Function. Accordi…Aug 31, 2022›
CVE-2020-6972CRITICAL
9.1
In Notifier Web Server (NWS) Version 3.50 and earlier, the Honeywell Fire Web Server’s authenticatio…Mar 24, 2020›
CVE-2017-5142CRITICAL
9.1
An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and…Feb 13, 2017›