CVE-2016-8344
Summary
| CVE | CVE-2016-8344 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-02-13 21:59:00 UTC |
| Updated | 2019-04-09 15:31:00 UTC |
| Description | An issue was discovered in Honeywell Experion Process Knowledge System (PKS) platform: Experion PKS, Release 3xx and prior, Experion PKS, Release 400, Experion PKS, Release 410, Experion PKS, Release 430, and Experion PKS, Release 431. Experion PKS does not properly validate input. By sending a specially crafted packet, an attacker could cause the process to terminate. A successful exploit would prevent firmware uploads to the Series-C devices. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Honeywell | Experion Process Knowledge System | 410 | All | All | All |
| Application | Honeywell | Experion Process Knowledge System | 430 | All | All | All |
| Application | Honeywell | Experion Process Knowledge System | 431 | All | All | All |
| Application | Honeywell | Experion Process Knowledge System | 410 | All | All | All |
| Application | Honeywell | Experion Process Knowledge System | 430 | All | All | All |
| Application | Honeywell | Experion Process Knowledge System | 431 | All | All | All |
| Application | Honeywell | Experion Process Knowledge System | All | All | All | All |
| Application | Honeywell | Experion Process Knowledge System | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Honeywell Experion PKS Improper Input Validation Vulnerability | ICS-CERT | MISC | ics-cert.us-cert.gov | Mitigation, Third Party Advisory, US Government Resource |
| Honeywell Experion PKS CVE-2016-8344 Denial of Service Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.