An issue was discovered in Honeywell Experion Process Knowledge System (PKS) platform: Experion PKS, Release 3xx and prior, Experion PKS, Release 400, Experion PKS, Release 410, Experion PKS, Release 430, and Experion PKS, Release 431. Experion PKS does not properly validate input. By sending a specially crafted packet, an attacker could cause the process to terminate. A successful exploit would prevent firmware uploads to the Series-C devices.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93950 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-16-301-01 | Mitigation Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/93950 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-16-301-01 | Mitigation Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/93950 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-16-301-01 - Mitigation, Third Party Advisory, US Government Resource |
Information
Published : 2017-02-13 21:59
Updated : 2024-11-21 02:59
NVD link : CVE-2016-8344
Mitre link : CVE-2016-8344
CVE.ORG link : CVE-2016-8344
JSON object : View
Products Affected
honeywell
- experion_process_knowledge_system
CWE
CWE-20
Improper Input Validation