Network Module (CNM) contains
insertion of sensitive information into an unintended directory. An attacker could exploit this vulnerability through probing
system files, potentially resulting in unintended
access to protected data.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://process.honeywell.com/ |
|
Thu, 21 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 21 May 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Honeywell Control Network Module (CNM) contains insertion of sensitive information into an unintended directory. An attacker could exploit this vulnerability through probing system files, potentially resulting in unintended access to protected data. | |
| Title | Improper storage of sensitive information | |
| Weaknesses | CWE-538 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Honeywell
Published:
Updated: 2026-05-21T12:06:44.395Z
Reserved: 2026-04-02T16:12:23.800Z
Link: CVE-2026-5434
Updated: 2026-05-21T12:06:36.288Z
Status : Awaiting Analysis
Published: 2026-05-21T09:16:30.410
Modified: 2026-05-21T15:26:35.653
Link: CVE-2026-5434
No data.
OpenCVE Enrichment
Updated: 2026-05-21T10:30:08Z