

These vulnerabilities take advantage of optimization methods for CPU instruction execution and could cause information disclosure. If additional exploits are found and mitigated, Honeywell will actively qualify hardware, operating system, and hypervisor patches as they become available. Mitigations for these vulnerabilities may decrease PC platform performance the magnitude of the decrease depends on the specific platforms in use. For all Honeywell products, including Honeywell applications that run on standalone platforms, care should be taken to ensure that any decrease in platform performance based on these mitigations does not significantly affect critical operations. The following Security Notifications have been issued on these vulnerabilities: It is recommended that you follow the best practices described on this page under “Honeywell Recommends Steps to Mitigate Threats Posed by Malware,” including installing the latest qualified Windows patches. Read and implement the best practices as defined in the Experion Network Security Guidelines and Safety Manager safety manual. Use and verify change management procedures with the Safety Manager key switch. Please refer to the Safety Manager safety manual (rev R153.4, Section 3) about key positions. Implement whitelisting on the engineering workstation nodes where configuration is performed for DCS (ControlBuilder) and Safety (SafetyBuilder). Honeywell has supported solutions for both McAfee and BIT 9 whitelisting solutions. For customers that do not have their Experion system whitelisted today, they can whitelist a single end node (unmanaged node) without an ePO server using McAfee whitelisting. Customers that are using whitelisting in their Experion systems today should make sure they have the latest policy files from Honeywell. Honeywell service technicians can perform the installation and configuration. Safety Engineering Tools when not in use. Make sure the Safetyīuilder is patched when bringing back online Node online during safety build configurations.
