{"api_version":"1","generated_at":"2026-05-15T06:36:09+00:00","cve":"CVE-2016-8344","urls":{"html":"https://cve.report/CVE-2016-8344","api":"https://cve.report/api/cve/CVE-2016-8344.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2016-8344","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2016-8344"},"summary":{"title":"CVE-2016-8344","description":"An issue was discovered in Honeywell Experion Process Knowledge System (PKS) platform: Experion PKS, Release 3xx and prior, Experion PKS, Release 400, Experion PKS, Release 410, Experion PKS, Release 430, and Experion PKS, Release 431. Experion PKS does not properly validate input. By sending a specially crafted packet, an attacker could cause the process to terminate. A successful exploit would prevent firmware uploads to the Series-C devices.","state":"PUBLISHED","assigner":"icscert","published_at":"2017-02-13 21:59:00","updated_at":"2025-04-20 01:37:25"},"problem_types":["CWE-20","Honeywell Experion PKS Improper Input Validation Vulnerability"],"metrics":[{"version":"3.0","source":"nvd@nist.gov","type":"Primary","score":"3.7","severity":"LOW","vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","data":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"4.3","severity":"","vector":"AV:N/AC:M/Au:N/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.securityfocus.com/bid/93950","name":"http://www.securityfocus.com/bid/93950","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"Honeywell Experion PKS CVE-2016-8344 Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-16-301-01","name":"https://ics-cert.us-cert.gov/advisories/ICSA-16-301-01","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Third Party Advisory","US Government Resource"],"title":"Honeywell Experion PKS Improper Input Validation Vulnerability | ICS-CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2016-8344","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8344","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"Honeywell Experion PKS through 431","version":"affected Honeywell Experion PKS through 431","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2016","cve_id":"8344","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"honeywell","cpe5":"experion_process_knowledge_system","cpe6":"410","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"8344","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"honeywell","cpe5":"experion_process_knowledge_system","cpe6":"430","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"8344","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"honeywell","cpe5":"experion_process_knowledge_system","cpe6":"431","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"8344","vulnerable":"1","versionEndIncluding":"311","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"honeywell","cpe5":"experion_process_knowledge_system","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"8344","vulnerable":"1","versionEndIncluding":"411","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"honeywell","cpe5":"experion_process_knowledge_system","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-06T02:20:30.912Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://ics-cert.us-cert.gov/advisories/ICSA-16-301-01"},{"name":"93950","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/93950"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"Honeywell Experion PKS through 431","vendor":"n/a","versions":[{"status":"affected","version":"Honeywell Experion PKS through 431"}]}],"datePublic":"2017-02-13T00:00:00.000Z","descriptions":[{"lang":"en","value":"An issue was discovered in Honeywell Experion Process Knowledge System (PKS) platform: Experion PKS, Release 3xx and prior, Experion PKS, Release 400, Experion PKS, Release 410, Experion PKS, Release 430, and Experion PKS, Release 431. Experion PKS does not properly validate input. By sending a specially crafted packet, an attacker could cause the process to terminate. A successful exploit would prevent firmware uploads to the Series-C devices."}],"problemTypes":[{"descriptions":[{"description":"Honeywell Experion PKS Improper Input Validation Vulnerability","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-02-14T10:57:01.000Z","orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://ics-cert.us-cert.gov/advisories/ICSA-16-301-01"},{"name":"93950","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/93950"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2016-8344","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Honeywell Experion PKS through 431","version":{"version_data":[{"version_value":"Honeywell Experion PKS through 431"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Honeywell Experion Process Knowledge System (PKS) platform: Experion PKS, Release 3xx and prior, Experion PKS, Release 400, Experion PKS, Release 410, Experion PKS, Release 430, and Experion PKS, Release 431. Experion PKS does not properly validate input. By sending a specially crafted packet, an attacker could cause the process to terminate. A successful exploit would prevent firmware uploads to the Series-C devices."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Honeywell Experion PKS Improper Input Validation Vulnerability"}]}]},"references":{"reference_data":[{"name":"https://ics-cert.us-cert.gov/advisories/ICSA-16-301-01","refsource":"MISC","url":"https://ics-cert.us-cert.gov/advisories/ICSA-16-301-01"},{"name":"93950","refsource":"BID","url":"http://www.securityfocus.com/bid/93950"}]}}}},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2016-8344","datePublished":"2017-02-13T21:00:00.000Z","dateReserved":"2016-09-28T00:00:00.000Z","dateUpdated":"2024-08-06T02:20:30.912Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2017-02-13 21:59:00","lastModifiedDate":"2025-04-20 01:37:25","problem_types":["CWE-20","Honeywell Experion PKS Improper Input Validation Vulnerability"],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:honeywell:experion_process_knowledge_system:*:*:*:*:*:*:*:*","versionEndIncluding":"311","matchCriteriaId":"32AD7777-22F4-4099-839B-DAEAA2A5974B"},{"vulnerable":true,"criteria":"cpe:2.3:a:honeywell:experion_process_knowledge_system:410:*:*:*:*:*:*:*","matchCriteriaId":"78596F1B-105A-49E6-BA88-4FD7B3E77F9A"},{"vulnerable":true,"criteria":"cpe:2.3:a:honeywell:experion_process_knowledge_system:430:*:*:*:*:*:*:*","matchCriteriaId":"90438882-38D1-4C4E-9018-A42E7E42C4FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:honeywell:experion_process_knowledge_system:431:*:*:*:*:*:*:*","matchCriteriaId":"D08E8D07-5539-4608-94C7-4A5F44B4EC8C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:honeywell:experion_process_knowledge_system:*:*:*:*:*:*:*:*","versionEndIncluding":"411","matchCriteriaId":"B633CF96-C485-47EC-8986-F090642EA236"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2016","CveId":"8344","Ordinal":"1","Title":"CVE-2016-8344","CVE":"CVE-2016-8344","Year":"2016"},"notes":[{"CveYear":"2016","CveId":"8344","Ordinal":"1","NoteData":"An issue was discovered in Honeywell Experion Process Knowledge System (PKS) platform: Experion PKS, Release 3xx and prior, Experion PKS, Release 400, Experion PKS, Release 410, Experion PKS, Release 430, and Experion PKS, Release 431. Experion PKS does not properly validate input. By sending a specially crafted packet, an attacker could cause the process to terminate. A successful exploit would prevent firmware uploads to the Series-C devices.","Type":"Description","Title":"CVE-2016-8344"},{"CveYear":"2016","CveId":"8344","Ordinal":"2","NoteData":"2017-02-13","Type":"Other","Title":"Published"},{"CveYear":"2016","CveId":"8344","Ordinal":"3","NoteData":"2017-02-14","Type":"Other","Title":"Modified"}]}}}