🔐 CVE Alert

CVE-2026-5433

CRITICAL 9.1

Improper Sanitization in CNM Web Interface

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

Honeywell Control Network Module (CNM) contains command injection vulnerability in the web interface. An attacker could exploit this vulnerability via command delimiters, potentially resulting in Remote Code Execution (RCE).

Vendor honeywell international inc.
Product control network module (cnm)
Published May 21, 2026
Stay Ahead of the Next One

Get instant alerts for honeywell international inc. control network module (cnm)

Be the first to know when new critical vulnerabilities affecting honeywell international inc. control network module (cnm) are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Honeywell International Inc. / Control Network Module (CNM)
100.1 ≤ 110.2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
process.honeywell.com: https://process.honeywell.com/

Credits

Andreas Krämer, BASF Digital Solutions GmbH Martin Floeck, BASF Digital Solutions GmbH Stefan Stahl, BASF Digital Solutions GmbH