CVE-2016-8344

An issue was discovered in Honeywell Experion Process Knowledge System (PKS) platform: Experion PKS, Release 3xx and prior, Experion PKS, Release 400, Experion PKS, Release 410, Experion PKS, Release 430, and Experion PKS, Release 431. Experion PKS does not properly validate input. By sending a specially crafted packet, an attacker could cause the process to terminate. A successful exploit would prevent firmware uploads to the Series-C devices.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-16-301-01 Mitigation Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/93950 Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:honeywell:experion_process_knowledge_system:*:*:*:*:*:*:*:*
cpe:2.3:a:honeywell:experion_process_knowledge_system:410:*:*:*:*:*:*:*
cpe:2.3:a:honeywell:experion_process_knowledge_system:430:*:*:*:*:*:*:*
cpe:2.3:a:honeywell:experion_process_knowledge_system:431:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:honeywell:experion_process_knowledge_system:*:*:*:*:*:*:*:*

Information

Published : 2017-02-13 13:59

Updated : 2019-04-09 08:31


NVD link : CVE-2016-8344

Mitre link : CVE-2016-8344


JSON object : View

CWE
CWE-20

Improper Input Validation

Advertisement

dedicated server usa

Products Affected

honeywell

  • experion_process_knowledge_system