Advisory

CISA reports vulnerabilities in multiple Honeywell products, some critical

Take action: If you are using Honeywell ICS systems (Experion PKS, Experion LX, PlantCruise by Experion, Safety Manager, and Safety Manager SC), review the advisories for patching. First make sure your systems are isolated from the internet and only accessible from trusted networks. Then plan for patching, prioritize the critical issues (CVSS above 9)


Learn More

The Cybersecurity & Infrastructure Security Agency (CISA) has issued an advisory regarding multiple vulnerabilities in Honeywell products that are used in critical infrastructure sectors like chemicals, critical manufacturing, energy, water, and wastewater systems.

The vulnerabilities allow for remote code execution, privilege escalation, and sensitive information disclosure.

The affected Honeywell products include Experion PKS, Experion LX, PlantCruise by Experion, Safety Manager, and Safety Manager SC.

These vulnerabilities are:

  • CVE-2023-5393 (CVSS score 9.2) in Experion servers or stations allows for denial-of-service or remote code execution via specially crafted messages.
  • CVE-2023-5395, CVE-2023-5401 and CVE-2023-5403 (CVSS score 9.2) could be used for similar attacks on Experion Servers and Stations.
  • CVE-2023-5400, CVE-2023-5404 (CVSS score 9.2) both vulnerabilities present in Experion Servers or Stations, could allow for denial-of-service attacks or remote code execution via crafted messages.
  • CVE-2023-5397 (CVSS score 9.2) enables denial-of-service or remote code execution via specially crafted messages.
  • CVE-2023-5389 (CVSS score 8.8) could allow attackers to modify files on Experion controllers or SMSC S300, potentially leading to unexpected behavior or execution of malicious applications.
  • CVE-2023-5398 (CVSS score 8.7) in Experion Servers or Stations could attackers attacker to induce a denial-of-service condition using specially crafted messages over the host network.
  • CVE-2023-5392 (CVSS score 8.7) could be exploited to allow for further extraction of information than required from memory over the network.
  • CVE-2023-5407 (CVSS score 8.3) could enable attackers to induce denial-of-service conditions or perform remote code execution on Experion controllers, ControlEdge PLC, Safety Manager, or SMSC S300 through crafted messages.
  • CVE-2023-5396 (CVSS score 8.3) enables denial-of-service or remote code execution via specially crafted messages.
  • CVE-2023-5394 (CVSS score 8.3) in Experion servers or stations enables denial-of-service or remote code execution via specially crafted messages.
  • CVE-2023-5406 (CVSS score 8.2) could lead to attacker controlled manipulation of messages from controllers for denial-of-service or remote code execution over host networks.
  • CVE-2023-5390 (CVSS score 6.9) allows attackers to read files from Experion controllers or SMSC S300, exposing limited information from the device.
  • CVE-2023-5405 (CVSS score 6.9) exploitation of this vulnerability in Experion Servers or Stations could result in information leaks during error generation.

Honeywell has addressed these vulnerabilities by releasing updates for the affected products. CISA recommends that all users of these products urgently upgrade to the recommended versions to mitigate the risks associated with these vulnerabilities.

CISA reports vulnerabilities in multiple Honeywell products, some critical