Honeywell Control
Network Module (CNM) contains
insertion of sensitive information into an unintended directory. An attacker could exploit this vulnerability through probing
system files, potentially resulting in unintended
access to protected data.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://process.honeywell.com/ |
|
History
Thu, 21 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 21 May 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Honeywell Control Network Module (CNM) contains insertion of sensitive information into an unintended directory. An attacker could exploit this vulnerability through probing system files, potentially resulting in unintended access to protected data. | |
| Title | Improper storage of sensitive information | |
| Weaknesses | CWE-538 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Honeywell
Published:
Updated: 2026-05-21T12:06:44.395Z
Reserved: 2026-04-02T16:12:23.800Z
Link: CVE-2026-5434
Updated: 2026-05-21T12:06:36.288Z
Status : Awaiting Analysis
Published: 2026-05-21T09:16:30.410
Modified: 2026-05-21T15:26:35.653
Link: CVE-2026-5434
No data.
OpenCVE Enrichment
Updated: 2026-05-21T10:30:08Z