First published: Mon Mar 25 2019(Updated: )
Multiple stack-based buffer overflow vulnerabilities were found in Honeywell Experion PKS all versions prior to R400.6, all versions prior to R410.6, and all versions prior to R430.2 modules that could lead to possible remote code execution, dynamic memory corruption, or denial of service. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Experion Process Knowledge System | >=r400<r400.6 | |
Honeywell Experion Process Knowledge System | >=r410<r410.6 | |
Honeywell Experion Process Knowledge System | >=r430<r430.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9189 has a high severity rating due to its potential to allow remote code execution and cause denial of service.
To fix CVE-2014-9189, upgrade to Honeywell Experion PKS versions R400.6, R410.6, or R430.2 or later.
CVE-2014-9189 affects all versions of Honeywell Experion Process Knowledge System prior to R400.6, R410.6, and R430.2.
Yes, CVE-2014-9189 can lead to data breaches due to the possibility of remote code execution.
CVE-2014-9189 can facilitate attacks leading to remote code execution, dynamic memory corruption, or denial of service.