First published: Mon Apr 08 2019(Updated: )
An arbitrary memory write vulnerability exists in the dual_onsrv.exe module in Honeywell Experion PKS R40x before R400.6, R41x before R410.6, and R43x before R430.2, that could lead to possible remote code execution or denial of service. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Experion Process Knowledge System | >=r400<r400.6 | |
Honeywell Experion Process Knowledge System | >=r410<r410.6 | |
Honeywell Experion Process Knowledge System | >=r430<r430.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5435 is classified as a high-severity vulnerability due to the potential for remote code execution or denial of service.
To remediate CVE-2014-5435, upgrade the Honeywell Experion Process Knowledge System to versions R400.6 or later, R410.6 or later, or R430.2 or later.
CVE-2014-5435 affects Honeywell Experion PKS R40x prior to R400.6, R41x prior to R410.6, and R43x prior to R430.2.
Yes, CVE-2014-5435 could potentially lead to data breaches if an attacker exploits the arbitrary memory write vulnerability.
Yes, a patch is available through Honeywell for CVE-2014-5435 in the form of updated software versions.