Honeywell Control
Network Module (CNM) contains
insertion of sensitive information into an unintended directory. An attacker could exploit this vulnerability through probing
system files, potentially resulting in unintended
access to protected data.
Network Module (CNM) contains
insertion of sensitive information into an unintended directory. An attacker could exploit this vulnerability through probing
system files, potentially resulting in unintended
access to protected data.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://process.honeywell.com/ |
|
History
Thu, 21 May 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Honeywell Control Network Module (CNM) contains insertion of sensitive information into an unintended directory. An attacker could exploit this vulnerability through probing system files, potentially resulting in unintended access to protected data. | |
| Title | Improper storage of sensitive information | |
| Weaknesses | CWE-538 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Honeywell
Published:
Updated: 2026-05-21T08:38:25.477Z
Reserved: 2026-04-02T16:12:23.800Z
Link: CVE-2026-5434
No data.
Status : Received
Published: 2026-05-21T09:16:30.410
Modified: 2026-05-21T09:16:30.410
Link: CVE-2026-5434
No data.
OpenCVE Enrichment
Updated: 2026-05-21T10:30:08Z
Weaknesses