CWE-226

Sensitive Information in Resource Not Removed Before Reuse

The product releases a resource such as memory or a file so that it can be made available for reuse, but it does not clear or "zeroize" the information contained in the resource before the product performs a critical state transition or makes the resource available for reuse by other entities.

CVE-2025-2522 (GCVE-0-2025-2522)
Vulnerability from cvelistv5
Published
2025-07-10 20:11
Modified
2025-08-04 19:45
CWE
  • CWE-226 - Sensitive Information in Resource Not Removed Before Reuse
Summary
The Honeywell Experion PKS and OneWireless WDM contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior. Honeywell also recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.  The affected Experion PKS products are C300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are 520.1 before 520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.
References
Impacted products
Vendor Product Version
Honeywell C300 PCNT02 Version: 520.1    520.2 TCU9
Version: 530    530 TCU3
Create a notification for this product.
   Honeywell C300 PCNT05 Version: 520.1    520.2 TCU9
Version: 530    530 TCU3
Create a notification for this product.
   Honeywell FIM4 Version: 520.1    520.2 TCU9
Version: 530    530 TCU3
Create a notification for this product.
   Honeywell FIM8 Version: 520.1    520.2 TCU9
Version: 530    530 TCU3
Create a notification for this product.
   Honeywell UOC Version: 520.1    520.2 TCU9
Version: 530    530 TCU3
Create a notification for this product.
   Honeywell CN100 Version: 520.1    520.2 TCU9
Version: 530    530 TCU3
Create a notification for this product.
   Honeywell HCA Version: 520.1    520.2 TCU9
Version: 530    530 TCU3
Create a notification for this product.
   Honeywell C300PM Version: 520.1    520.2 TCU9
Version: 530    530 TCU3
Create a notification for this product.
   Honeywell C200E Version: 520.1    520.2 TCU9
Version: 530    530 TCU3
Create a notification for this product.
   Honeywell Wireless Device Manager Version: 322.1    322.4
Version: 330.1    330.3
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2522",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-10T20:34:00.516806Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-10T20:34:08.789Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Experion PKS"
          ],
          "product": "C300 PCNT02",
          "vendor": "Honeywell",
          "versions": [
            {
              "lessThanOrEqual": "520.2 TCU9",
              "status": "affected",
              "version": "520.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "530 TCU3",
              "status": "affected",
              "version": "530",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Experion PKS"
          ],
          "product": "C300 PCNT05",
          "vendor": "Honeywell",
          "versions": [
            {
              "lessThanOrEqual": "520.2 TCU9",
              "status": "affected",
              "version": "520.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "530 TCU3",
              "status": "affected",
              "version": "530",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Experion PKS"
          ],
          "product": "FIM4",
          "vendor": "Honeywell",
          "versions": [
            {
              "lessThanOrEqual": "520.2 TCU9",
              "status": "affected",
              "version": "520.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "530 TCU3",
              "status": "affected",
              "version": "530",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Experion PKS"
          ],
          "product": "FIM8",
          "vendor": "Honeywell",
          "versions": [
            {
              "lessThanOrEqual": "520.2 TCU9",
              "status": "affected",
              "version": "520.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "530 TCU3",
              "status": "affected",
              "version": "530",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Experion PKS"
          ],
          "product": "UOC",
          "vendor": "Honeywell",
          "versions": [
            {
              "lessThanOrEqual": "520.2 TCU9",
              "status": "affected",
              "version": "520.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "530 TCU3",
              "status": "affected",
              "version": "530",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Experion PKS"
          ],
          "product": "CN100",
          "vendor": "Honeywell",
          "versions": [
            {
              "lessThanOrEqual": "520.2 TCU9",
              "status": "affected",
              "version": "520.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "530 TCU3",
              "status": "affected",
              "version": "530",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Experion PKS"
          ],
          "product": "HCA",
          "vendor": "Honeywell",
          "versions": [
            {
              "lessThanOrEqual": "520.2 TCU9",
              "status": "affected",
              "version": "520.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "530 TCU3",
              "status": "affected",
              "version": "530",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Experion PKS"
          ],
          "product": "C300PM",
          "vendor": "Honeywell",
          "versions": [
            {
              "lessThanOrEqual": "520.2 TCU9",
              "status": "affected",
              "version": "520.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "530 TCU3",
              "status": "affected",
              "version": "530",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Experion PKS"
          ],
          "product": "C200E",
          "vendor": "Honeywell",
          "versions": [
            {
              "lessThanOrEqual": "520.2 TCU9",
              "status": "affected",
              "version": "520.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "530 TCU3",
              "status": "affected",
              "version": "530",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "OneWireless"
          ],
          "product": "Wireless Device Manager",
          "vendor": "Honeywell",
          "versions": [
            {
              "lessThanOrEqual": "322.4",
              "status": "affected",
              "version": "322.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "330.3",
              "status": "affected",
              "version": "330.1",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Demid Uzenkov and Kirill Kutaev (Positive Technologies)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Honeywell Experion PKS\u0026nbsp;and OneWireless WDM \n\n contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior.\n\n\u003cp\u003eHoneywell also recommends updating to the most recent version of \n\nHoneywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\u0026nbsp;\u003c/p\u003e\u003cp\u003eThe affected Experion PKS products are \n\n\n\nC300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E.  The Experion PKS versions affected are 520.1 before \n\n520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.\u003c/p\u003e"
            }
          ],
          "value": "The Honeywell Experion PKS\u00a0and OneWireless WDM \n\n contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior.\n\nHoneywell also recommends updating to the most recent version of \n\nHoneywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\u00a0\n\nThe affected Experion PKS products are \n\n\n\nC300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E.  The Experion PKS versions affected are 520.1 before \n\n520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-216",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-216 Communication Channel Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-226",
              "description": "CWE-226 Sensitive Information in Resource Not Removed Before Reuse",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-04T19:45:13.439Z",
        "orgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d",
        "shortName": "Honeywell"
      },
      "references": [
        {
          "url": "https://process.honeywell.com/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Lack of buffer clearing before reuse may result in incorrect system behavior.",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d",
    "assignerShortName": "Honeywell",
    "cveId": "CVE-2025-2522",
    "datePublished": "2025-07-10T20:11:43.603Z",
    "dateReserved": "2025-03-19T13:57:30.424Z",
    "dateUpdated": "2025-08-04T19:45:13.439Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Mitigation

Phases: Architecture and Design, Implementation

Description:

  • During critical state transitions, information not needed in the next state should be removed or overwritten with fixed patterns (such as all 0's) or random data, before the transition to the next state.
Mitigation

Phases: Architecture and Design, Implementation

Description:

  • When releasing, de-allocating, or deleting a resource, overwrite its data and relevant metadata with fixed patterns or random data. Be cautious about complex resource types whose underlying representation might be non-contiguous or change at a low level, such as how a file might be split into different chunks on a file system, even though "logical" file positions are contiguous at the application layer. Such resource types might require invocation of special modes or APIs to tell the underlying operating system to perform the necessary clearing, such as SDelete (Secure Delete) on Windows, although the appropriate functionality might not be available at the application layer.
CAPEC-37: Retrieve Embedded Sensitive Data

An attacker examines a target system to find sensitive data that has been embedded within it. This information can reveal confidential contents, such as account numbers or individual keys/credentials that can be used as an intermediate step in a larger attack.

Back to CWE stats page