CWE-226
Sensitive Information in Resource Not Removed Before Reuse
The product releases a resource such as memory or a file so that it can be made available for reuse, but it does not clear or "zeroize" the information contained in the resource before the product performs a critical state transition or makes the resource available for reuse by other entities.
CVE-2025-2522 (GCVE-0-2025-2522)
Vulnerability from cvelistv5
Published
2025-07-10 20:11
Modified
2025-08-04 19:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-226 - Sensitive Information in Resource Not Removed Before Reuse
Summary
The Honeywell Experion PKS and OneWireless WDM
contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior.
Honeywell also recommends updating to the most recent version of
Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.
The affected Experion PKS products are
C300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are 520.1 before
520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.
References
▼ | URL | Tags |
---|---|---|
https://process.honeywell.com/ |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Honeywell | C300 PCNT02 |
Version: 520.1 ≤ 520.2 TCU9 Version: 530 ≤ 530 TCU3 |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2522", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-10T20:34:00.516806Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-10T20:34:08.789Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "C300 PCNT02", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "C300 PCNT05", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "FIM4", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "FIM8", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "UOC", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "CN100", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "HCA", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "C300PM", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Experion PKS" ], "product": "C200E", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "520.2 TCU9", "status": "affected", "version": "520.1", "versionType": "semver" }, { "lessThanOrEqual": "530 TCU3", "status": "affected", "version": "530", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "platforms": [ "OneWireless" ], "product": "Wireless Device Manager", "vendor": "Honeywell", "versions": [ { "lessThanOrEqual": "322.4", "status": "affected", "version": "322.1", "versionType": "semver" }, { "lessThanOrEqual": "330.3", "status": "affected", "version": "330.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Demid Uzenkov and Kirill Kutaev (Positive Technologies)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Honeywell Experion PKS\u0026nbsp;and OneWireless WDM \n\n contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior.\n\n\u003cp\u003eHoneywell also recommends updating to the most recent version of \n\nHoneywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\u0026nbsp;\u003c/p\u003e\u003cp\u003eThe affected Experion PKS products are \n\n\n\nC300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are 520.1 before \n\n520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.\u003c/p\u003e" } ], "value": "The Honeywell Experion PKS\u00a0and OneWireless WDM \n\n contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior.\n\nHoneywell also recommends updating to the most recent version of \n\nHoneywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.\u00a0\n\nThe affected Experion PKS products are \n\n\n\nC300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are 520.1 before \n\n520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3." } ], "impacts": [ { "capecId": "CAPEC-216", "descriptions": [ { "lang": "en", "value": "CAPEC-216 Communication Channel Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-226", "description": "CWE-226 Sensitive Information in Resource Not Removed Before Reuse", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-04T19:45:13.439Z", "orgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d", "shortName": "Honeywell" }, "references": [ { "url": "https://process.honeywell.com/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Lack of buffer clearing before reuse may result in incorrect system behavior.", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d", "assignerShortName": "Honeywell", "cveId": "CVE-2025-2522", "datePublished": "2025-07-10T20:11:43.603Z", "dateReserved": "2025-03-19T13:57:30.424Z", "dateUpdated": "2025-08-04T19:45:13.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phases: Architecture and Design, Implementation
Description:
- During critical state transitions, information not needed in the next state should be removed or overwritten with fixed patterns (such as all 0's) or random data, before the transition to the next state.
Mitigation
Phases: Architecture and Design, Implementation
Description:
- When releasing, de-allocating, or deleting a resource, overwrite its data and relevant metadata with fixed patterns or random data. Be cautious about complex resource types whose underlying representation might be non-contiguous or change at a low level, such as how a file might be split into different chunks on a file system, even though "logical" file positions are contiguous at the application layer. Such resource types might require invocation of special modes or APIs to tell the underlying operating system to perform the necessary clearing, such as SDelete (Secure Delete) on Windows, although the appropriate functionality might not be available at the application layer.
CAPEC-37: Retrieve Embedded Sensitive Data
An attacker examines a target system to find sensitive data that has been embedded within it. This information can reveal confidential contents, such as account numbers or individual keys/credentials that can be used as an intermediate step in a larger attack.