Network Module (CNM) contains
insertion of sensitive information into an unintended directory. An attacker could exploit this vulnerability through probing
system files, potentially resulting in unintended
access to protected data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://process.honeywell.com/ |
|
Fri, 22 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Honeywell
Honeywell control Network Module (cnm) |
|
| Vendors & Products |
Honeywell
Honeywell control Network Module (cnm) |
Thu, 21 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 21 May 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Honeywell Control Network Module (CNM) contains insertion of sensitive information into an unintended directory. An attacker could exploit this vulnerability through probing system files, potentially resulting in unintended access to protected data. | |
| Title | Improper storage of sensitive information | |
| Weaknesses | CWE-538 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Honeywell
Published:
Updated: 2026-05-21T12:06:44.395Z
Reserved: 2026-04-02T16:12:23.800Z
Link: CVE-2026-5434
Updated: 2026-05-21T12:06:36.288Z
Status : Undergoing Analysis
Published: 2026-05-21T09:16:30.410
Modified: 2026-05-21T15:26:35.653
Link: CVE-2026-5434
No data.
OpenCVE Enrichment
Updated: 2026-05-22T12:38:45Z