AID
Automation
Information Directory
HomeCVE FeedBrands
AID
Automation Information Directory
CVE data sourced from NIST NVD · Documentation links from official sources
Home›Brands›Honeywell
HO
Platform

Honeywell

Experion PKS DCS, ControlEdge PLCs, UniSim Design, and Forge ICS cybersecurity platform for process industries.

https://www.honeywell.com/us/en/industries/industrial-automation →
105
Total CVEs
0
Resources
26
CRIT
45
HIGH
31
MED
2
LOW
CVEsCVEsSpecsTech SpecsDocsTech DocsImplImplementationsExamplesExamples
31 / 105
CVE-2025-12351MEDIUM

Honeywell S35 Series Cameras contains an authorization bypass Vulnerability through User controller key. An attacker could potentially exploit this vulnerability, leading to Privilege Escalation to admin privileged functionalities . Honeywell also recommends updating to the most recent version of this product, service or offering (S35 Pinhole/Kit Camera to version 2025.08.28, S35 AI Fisheye & Dual Sensor/Micro Dome/Full Color Eyeball & Bullet Camera to version 2025.08.22, S35 Thermal Camera to version 2025.08.26).

Oct 27, 2025
6.8
CVE-2022-30316MEDIUM

Honeywell Experion PKS Safety Manager 5.02 has Insufficient Verification of Data Authenticity. According to FSCT-2022-0054, there is a Honeywell Experion PKS Safety Manager unauthenticated firmware update issue. The affected components are characterized as: Firmware update functionality. The potential impact is: Firmware manipulation. The Honeywell Experion PKS Safety Manager utilizes the DCOM-232/485 communication FTA serial interface and Enea POLO bootloader for firmware management purposes. An engineering workstation running the Safety Builder software communicates via serial or serial-over-ethernet link with the DCOM-232/485 interface. Firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks. Firmware images are unsigned. An attacker with access to the serial interface (either through physical access, a compromised EWS or an exposed serial-to-ethernet gateway) can utilize hardcoded credentials (see FSCT-2022-0052) for the POLO bootloader to control the boot process and push malicious firmware images to the controller allowing for firmware manipulation, remote code execution and denial of service impacts. A mitigating factor is that in order for a firmware update to be initiated, the Safety Manager has to be rebooted which is typically done by means of physical controls on the Safety Manager itself. As such, an attacker would have to either lay dormant until a legitimate reboot occurs or possibly attempt to force a reboot through a secondary vulnerability.

Jul 28, 2022
6.8
CVE-2022-30242MEDIUM

Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered.

Jul 15, 2022
6.8
CVE-2015-2848MEDIUM

Cross-site request forgery (CSRF) vulnerability in Honeywell Tuxedo Touch before 5.2.19.0_VA allows remote attackers to hijack the authentication of arbitrary users for requests associated with home-automation commands, as demonstrated by a door-unlock command.

Jul 26, 2015
6.8
CVE-2013-0108MEDIUM

An ActiveX control in HscRemoteDeploy.dll in Honeywell Enterprise Buildings Integrator (EBI) R310, R400.2, R410.1, and R410.2; SymmetrE R310, R410.1, and R410.2; ComfortPoint Open Manager (aka CPO-M) Station R100; and HMIWeb Browser client packages allows remote attackers to execute arbitrary code via a crafted HTML document.

Feb 24, 2013
6.8
CVE-2023-3712MEDIUM

Files or Directories Accessible to External Parties vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Privilege Escalation.This issue affects PM43 versions prior to P10.19.050004.  Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).

Sep 12, 2023
6.6
CVE-2025-2522MEDIUM

The Honeywell Experion PKS and OneWireless WDM contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior. Honeywell also recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.  The affected Experion PKS products are C300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are 520.1 before 520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.

Jul 10, 2025
6.5
CVE-2023-51605MEDIUM

Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. . Was ZDI-CAN-18644.

May 3, 2024
6.5
CVE-2023-51604MEDIUM

Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. . Was ZDI-CAN-18593.

May 3, 2024
6.5
CVE-2023-51602MEDIUM

Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. . Was ZDI-CAN-18591.

May 3, 2024
6.5
CVE-2023-51601MEDIUM

Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of xml files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. . Was ZDI-CAN-18563.

May 3, 2024
6.5
CVE-2023-51600MEDIUM

Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. . Was ZDI-CAN-18456.

May 3, 2024
6.5
CVE-2024-1309MEDIUM

Uncontrolled Resource Consumption vulnerability in Honeywell Niagara Framework on Windows, Linux, QNX allows Content Spoofing.This issue affects Niagara Framework: before Niagara AX 3.8.1, before Niagara 4.1.

Feb 13, 2024
6.5
CVE-2022-4240MEDIUM

Missing Authentication for Critical Function vulnerability in Honeywell OneWireless allows Authentication Bypass. This issue affects OneWireless version 322.1

May 30, 2023
6.5
CVE-2022-30245MEDIUM

Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered.

Jul 15, 2022
6.5
CVE-2023-3711MEDIUM

Session Fixation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Session Credential Falsification through Prediction.This issue affects PM43 versions prior to P10.19.050004. Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).

Sep 12, 2023
6.4
CVE-2022-43485MEDIUM

Use of Insufficiently Random Values in Honeywell OneWireless. This vulnerability may allow attacker to manipulate claims in client's JWT token. This issue affects OneWireless version 322.1

May 30, 2023
6.2
CVE-2022-2332MEDIUM

A local unprivileged attacker may escalate to administrator privileges in Honeywell SoftMaster version 4.51, due to insecure permission assignment.

Sep 16, 2022
6.2
CVE-2018-8714MEDIUM

Honeywell MatrikonOPC OPC Controller before 5.1.0.0 allows local users to transfer arbitrary files from a host computer and consequently obtain sensitive information via vectors related to MSXML libraries.

May 17, 2018
6.1
CVE-2017-5141MEDIUM

An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and XLWeb 500 XLWebExe-1-02-08 and prior. An attacker can establish a new user session, without invalidating any existing session identifier, which gives the opportunity to steal authenticated sessions (SESSION FIXATION).

Feb 13, 2017
6.0
CVE-2023-5407MEDIUM

Controller denial of service due to improper handling of a specially crafted message received by the controller. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
5.9
CVE-2023-5406MEDIUM

Server communication with a controller can lead to remote code execution using a specially crafted message from the controller. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
5.9
CVE-2023-5405MEDIUM

Server information leak for the CDA Server process memory can occur when an error is generated in response to a specially crafted message. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
5.9
CVE-2023-5398MEDIUM

Server receiving a malformed message based on a list of IPs resulting in heap corruption causing a denial of service. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
5.9
CVE-2022-1261MEDIUM

Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges.

May 26, 2022
5.8
CVE-2018-14825MEDIUM

On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.

Sep 24, 2018
5.8
CVE-2023-5390MEDIUM

An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

Jan 31, 2024
5.3
CVE-2019-13523MEDIUM

In Honeywell Performance IP Cameras and Performance NVRs, the integrated web server of the affected devices could allow remote attackers to obtain web configuration data in JSON format for IP cameras and NVRs (Network Video Recorders), which can be accessed without authentication over the network. Affected performance IP Cameras: HBD3PR2,H4D3PRV3,HED3PR3,H4D3PRV2,HBD3PR1,H4W8PR2,HBW8PR2,H2W2PC1M,H2W4PER3,H2W2PER3,HEW2PER3,HEW4PER3B,HBW2PER1,HEW4PER2,HEW4PER2B,HEW2PER2,H4W2PER2,HBW2PER2,H4W2PER3, and HPW2P1. Affected Performance Series NVRs: HEN08104,HEN08144,HEN081124,HEN16104,HEN16144,HEN16184,HEN16204,HEN162244,HEN16284,HEN16304,HEN16384,HEN32104,HEN321124,HEN32204,HEN32284,HEN322164,HEN32304, HEN32384,HEN323164,HEN64204,HEN64304,HEN643164,HEN643324,HEN643484,HEN04103,HEN04113,HEN04123,HEN08103,HEN08113,HEN08123,HEN08143,HEN16103,HEN16123,HEN16143,HEN16163,HEN04103L,HEN08103L,HEN16103L,HEN32103L.

Sep 26, 2019
5.3
CVE-2015-2847MEDIUM

Honeywell Tuxedo Touch before 5.2.19.0_VA relies on client-side authentication involving JavaScript, which allows remote attackers to bypass intended access restrictions by removing USERACCT requests from the client-server data stream.

Jul 26, 2015
5.0
CVE-2022-30314MEDIUM

Honeywell Experion PKS Safety Manager 5.02 uses Hard-coded Credentials. According to FSCT-2022-0052, there is a Honeywell Experion PKS Safety Manager hardcoded credentials issue. The affected components are characterized as: POLO bootloader. The potential impact is: Manipulate firmware. The Honeywell Experion PKS Safety Manager utilizes the DCOM-232/485 serial interface for firmware management purposes. When booting, the Safety Manager exposes the Enea POLO bootloader via this interface. Access to the boot configuration is controlled by means of credentials hardcoded in the Safety Manager firmware. The credentials for the bootloader are hardcoded in the firmware. An attacker with access to the serial interface (either through physical access, a compromised EWS or an exposed serial-to-ethernet gateway) can utilize these credentials to control the boot process and manipulate the unauthenticated firmware image (see FSCT-2022-0054).

Jul 28, 2022
4.6
CVE-2014-3110MEDIUM

Multiple cross-site scripting (XSS) vulnerabilities on Honeywell FALCON XLWeb Linux controller devices 2.04.01 and earlier and FALCON XLWeb XLWebExe controller devices 2.02.11 and earlier allow remote attackers to inject arbitrary web script or HTML via invalid input.

Jul 24, 2014
4.3
CVE ID ⇅Severity ↓CVSS ⇅DescriptionPublished ⇅
CVE-2025-12351MEDIUM
6.8
Honeywell S35 Series Cameras contains an authorization bypass Vulnerability through User controller …Oct 27, 2025›
CVE-2022-30316MEDIUM
6.8
Honeywell Experion PKS Safety Manager 5.02 has Insufficient Verification of Data Authenticity. Accor…Jul 28, 2022›
CVE-2022-30242MEDIUM
6.8
Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated configuratio…Jul 15, 2022›
CVE-2015-2848MEDIUM
6.8
Cross-site request forgery (CSRF) vulnerability in Honeywell Tuxedo Touch before 5.2.19.0_VA allows …Jul 26, 2015›
CVE-2013-0108MEDIUM
6.8
An ActiveX control in HscRemoteDeploy.dll in Honeywell Enterprise Buildings Integrator (EBI) R310, R…Feb 24, 2013›
CVE-2023-3712MEDIUM
6.6
Files or Directories Accessible to External Parties vulnerability in Honeywell PM43 on 32 bit, ARM (…Sep 12, 2023›
CVE-2025-2522MEDIUM
6.5
The Honeywell Experion PKS and OneWireless WDM contains Sensitive Information in Resource vulnera…Jul 10, 2025›
CVE-2023-51605MEDIUM
6.5
Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerabilit…May 3, 2024›
CVE-2023-51604MEDIUM
6.5
Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerabilit…May 3, 2024›
CVE-2023-51602MEDIUM
6.5
Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerabilit…May 3, 2024›
CVE-2023-51601MEDIUM
6.5
Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerabilit…May 3, 2024›
CVE-2023-51600MEDIUM
6.5
Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerabilit…May 3, 2024›
CVE-2024-1309MEDIUM
6.5
Uncontrolled Resource Consumption vulnerability in Honeywell Niagara Framework on Windows, Linux, QN…Feb 13, 2024›
CVE-2022-4240MEDIUM
6.5
Missing Authentication for Critical Function vulnerability in Honeywell OneWireless allows Authentic…May 30, 2023›
CVE-2022-30245MEDIUM
6.5
Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote us…Jul 15, 2022›
CVE-2023-3711MEDIUM
6.4
Session Fixation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Se…Sep 12, 2023›
CVE-2022-43485MEDIUM
6.2
Use of Insufficiently Random Values in Honeywell OneWireless. This vulnerability may allow attacker…May 30, 2023›
CVE-2022-2332MEDIUM
6.2
A local unprivileged attacker may escalate to administrator privileges in Honeywell SoftMaster versi…Sep 16, 2022›
CVE-2018-8714MEDIUM
6.1
Honeywell MatrikonOPC OPC Controller before 5.1.0.0 allows local users to transfer arbitrary files f…May 17, 2018›
CVE-2017-5141MEDIUM
6.0
An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and…Feb 13, 2017›
CVE-2023-5407MEDIUM
5.9
Controller denial of service due to improper handling of a specially crafted message received by the…Apr 17, 2024›
CVE-2023-5406MEDIUM
5.9
Server communication with a controller can lead to remote code execution using a specially crafted m…Apr 17, 2024›
CVE-2023-5405MEDIUM
5.9
Server information leak for the CDA Server process memory can occur when an error is generated in re…Apr 17, 2024›
CVE-2023-5398MEDIUM
5.9
Server receiving a malformed message based on a list of IPs resulting in heap corruption causing a d…Apr 17, 2024›
CVE-2022-1261MEDIUM
5.8
Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition w…May 26, 2022›
CVE-2018-14825MEDIUM
5.8
On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 runnin…Sep 24, 2018›
CVE-2023-5390MEDIUM
5.3
An attacker could potentially exploit this vulnerability, leading to files being read from the Honey…Jan 31, 2024›
CVE-2019-13523MEDIUM
5.3
In Honeywell Performance IP Cameras and Performance NVRs, the integrated web server of the affected …Sep 26, 2019›
CVE-2015-2847MEDIUM
5.0
Honeywell Tuxedo Touch before 5.2.19.0_VA relies on client-side authentication involving JavaScript,…Jul 26, 2015›
CVE-2022-30314MEDIUM
4.6
Honeywell Experion PKS Safety Manager 5.02 uses Hard-coded Credentials. According to FSCT-2022-0052,…Jul 28, 2022›
CVE-2014-3110MEDIUM
4.3
Multiple cross-site scripting (XSS) vulnerabilities on Honeywell FALCON XLWeb Linux controller devic…Jul 24, 2014›