Description
Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to improper neutralization of special elements in output, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.
Published: 2022-10-28
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Honeywell recommends users follow all guidance in the Experion Network and Security Planning Guide to prevent attacks by malicious actors. Additional information can be found in Honeywell Support document SN2021-02-22-01.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-24847 Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to improper neutralization of special elements in output, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.
History

Wed, 16 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Honeywell Application Control Environment Application Control Environment Firmware C200 C200 Firmware C200e C200e Firmware C300 C300 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:07:52.218Z

Reserved: 2021-08-10T00:00:00.000Z

Link: CVE-2021-38395

cve-icon Vulnrichment

Updated: 2024-08-04T01:37:16.588Z

cve-icon NVD

Status : Modified

Published: 2022-10-28T02:15:16.857

Modified: 2024-11-21T06:16:59.503

Link: CVE-2021-38395

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses