Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes

Posted on July 31, 2025July 31, 2025 By CWS

Honeywell lately patched a number of vulnerabilities in its Experion Course of Information System (PKS) industrial course of management and automation resolution.

The existence of the failings was delivered to gentle by the US cybersecurity company CISA, which printed an advisory final week.

In line with the advisory, Honeywell Experion PKS merchandise — releases previous to R520.2 TCU9 Scorching Repair 1 and R530 TCU3 Scorching Repair 1 — are affected by six vulnerabilities, together with ones categorized as ‘essential’ and ‘excessive severity’. 

A majority of the critical- and high-severity flaws affect the Management Knowledge Entry (CDA) part and so they can result in distant code execution.

Two high-severity vulnerabilities could be exploited for DoS assaults, whereas a flaw rated ‘medium severity’ could be leveraged to control communication channels and trigger incorrect system conduct.

CISA identified that the impacted merchandise are used worldwide, together with in essential infrastructure sectors corresponding to essential manufacturing, chemical, vitality, water, and healthcare.   

“We deal with safety issues with utmost significance and act promptly to evaluate and rectify any points,” Honeywell informed SecurityWeek in an emailed assertion. “Following the invention of those vulnerabilities, we now have made updates to Experion PKS merchandise (C300 PCNT02, C300 PCNT05, EHB, EHPM, ELMM, Traditional ENIM, ETN, FIM4, FIM8, UOC, CN100, HCA, C300PM, PGM, RFIM and C200E) and our OneWireless WDM. It’s important for all customers to replace their programs to the model talked about in our Safety Discover for enhanced safety.”

The Russian cybersecurity agency Optimistic Applied sciences has been credited for reporting the vulnerabilities to Honeywell. Commercial. Scroll to proceed studying.

Dmitry Sklyar, who leads Optimistic Applied sciences’ industrial management programs (ICS) unit, informed SecurityWeek that the vulnerabilities have been found in Experion PKS units, which embrace field-level community converters and I/O modules. 

The skilled identified that the impacted units are usually utilized in industrial amenities in remoted community segments, making it unlikely for them to be exploited remotely over the web.

“The vulnerabilities have been present in community protocol handlers that lack identification and authentication capabilities. Because of this, the one prerequisite for exploitation is entry to the remoted section,” Sklyar defined.

In line with the researcher, the vulnerabilities can permit arbitrary code execution on compromised units, which “may doubtlessly allow an attacker to control the economic course of and the units themselves—stopping or rebooting them, modifying community settings, altering course of parameters, and so forth.”

“To guard in opposition to such vulnerabilities, we suggest implementing vulnerability administration programs,” Sklyar stated.

Earlier this month, Nozomi Networks disclosed the main points of over a dozen vulnerabilities discovered within the Niagara Framework developed by Honeywell-owned Tridium.

Associated: Order Out of Chaos – Utilizing Chaos Principle Encryption to Shield OT and IoT

Associated: Vulnerabilities Expose Helmholz Industrial Routers to Hacking

Associated: New York In search of Public Opinion on Water Programs Cyber Rules

Security Week News Tags:Experion, Flaws, Honeywell, Industrial, Manipulation, PKS, Processes

Post navigation

Previous Post: APT Hackers Attacking Maritime and Shipping Industry to Launch Ransomware Attacks
Next Post: Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

Related Posts

Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure Security Week News
From Tech Podcasts to Policy: Trump’s New AI Plan Leans Heavily on Silicon Valley Industry Ideas Security Week News
HeroDevs Raises $125 Million to Secure Deprecated OSS Security Week News
Canadian Airline WestJet Hit by Cyberattack Security Week News
Mobile Forensics Tool Used by Chinese Law Enforcement Dissected Security Week News
Cerby Raises $40 Million for Identity Automation Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News