PT-2014-51: Stack-based buffer overflow in Honeywell EPKS

Vulnerable software

Honeywell EPKS
Version: R311


Severity level

Severity level: High
Impact: Remote code execution, denial of service
Access Vector: Remote

CVSS v2:
Base Score: 9.3
Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVE: not assigned

Software description

Honeywell Experion PKS is a cost-effective open control and safety system that expands the role of distributed control. Experion provides a safe, robust, scalable, plant-wide system with unprecedented connectivity through all levels of the plant.

Vulnerability description

The specialists of the Positive Research center have detected a Stack-based buffer overflow vulnerability in Honeywell EPKS.

Stack-based buffer overflow was discovered in hscodbcn.exe module using function unmarshallString() for copying data from packet in stack buffer of static size without checking input which could lead to possible remote code execution or denial of service.

How to fix

Update your sofware up to the latest version

Advisory status

06.03.2014 - Vendor gets vulnerability details
02.06.2014 - Vendor releases fixed version and details
18.11.2014 - Public disclosure


The vulnerability was detected by Alexander Tlyapov, Positive Research Center (Positive Technologies Company)


Reports on the vulnerabilities previously discovered by Positive Research:

4G and 5G are not ready for smart cities