CVE-2026-5434

Published: Mag 21, 2026 Last Modified: Mag 21, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,9
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none

Description

AI Translation Available

Honeywell Control
Network Module (CNM) contains
insertion of sensitive information into an unintended directory. An attacker could exploit this vulnerability through probing
system files, potentially resulting in unintended
access to protected data.

538

Insertion of Sensitive Information into Externally-Accessible File or Directory

Draft
Common Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Files Or Directories
Applicable Platforms
All platforms may be affected
View CWE Details
https://process.honeywell.com/