CVE-2016-8344

An issue was discovered in Honeywell Experion Process Knowledge System (PKS) platform: Experion PKS, Release 3xx and prior, Experion PKS, Release 400, Experion PKS, Release 410, Experion PKS, Release 430, and Experion PKS, Release 431. Experion PKS does not properly validate input. By sending a specially crafted packet, an attacker could cause the process to terminate. A successful exploit would prevent firmware uploads to the Series-C devices.
References
Link Resource
http://www.securityfocus.com/bid/93950 Third Party Advisory VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-16-301-01 Mitigation Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:honeywell:experion_process_knowledge_system:*:*:*:*:*:*:*:*
cpe:2.3:a:honeywell:experion_process_knowledge_system:410:*:*:*:*:*:*:*
cpe:2.3:a:honeywell:experion_process_knowledge_system:430:*:*:*:*:*:*:*
cpe:2.3:a:honeywell:experion_process_knowledge_system:431:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:honeywell:experion_process_knowledge_system:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-02-13 21:59

Updated : 2024-02-28 15:44


NVD link : CVE-2016-8344

Mitre link : CVE-2016-8344

CVE.ORG link : CVE-2016-8344


JSON object : View

Products Affected

honeywell

  • experion_process_knowledge_system
CWE
CWE-20

Improper Input Validation