Honeywell Uniformance PHD Denial Of Service (Update A)
Honeywell Uniformance PHD versions R310.1.1.2, R320.1.0.2, and R321.1.1 contain a stack buffer overflow vulnerability (CWE-121) that allows a remote, unauthenticated attacker to crash the PHD server process. The vulnerability can be triggered by sending a specially crafted network message to the PHD server. When exploited, the server becomes unresponsive, denying access to historian data and potentially disrupting any control logic or monitoring systems that depend on real-time historian queries. No vendor patch is available for any affected version.
- Network access to the Uniformance PHD server port (typically 11001 or similar)
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/de4156f9-26fc-4844-8430-a3fd09ad583aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.