Honeywell OneWireless Wireless Device Manager (WDM)
Honeywell OneWireless Wireless Device Manager (WDM) firmware versions prior to R322.5 and R331.1 contain buffer overflow and memory corruption vulnerabilities (CWE-119, CWE-226, CWE-191, CWE-430) that allow remote code execution, information exposure, and denial of service without authentication. An attacker with network access to the WDM can exploit these vulnerabilities to gain control of wireless device management, compromise the integrity of process monitoring and control, or disrupt wireless communications across the facility.
- Network access to the OneWireless WDM device (typically on port 9200 or management interface)
- Device running OneWireless WDM firmware version prior to R322.5 or R331.1
- No authentication required to send malicious messages
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3fd8c116-9af0-4ab7-a14a-21b4ef7ae40cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.