Description
AutomationDirect C-more EA9 HTTP webserver uses an insecure mechanism to transport credentials from client to web server, which may allow an attacker to obtain the login credentials and login as a valid user. This issue affects: AutomationDirect C-more EA9 EA9-T6CL versions prior to 6.73; EA9-T6CL-R versions prior to 6.73; EA9-T7CL versions prior to 6.73; EA9-T7CL-R versions prior to 6.73; EA9-T8CL versions prior to 6.73; EA9-T10CL versions prior to 6.73; EA9-T10WCL versions prior to 6.73; EA9-T12CL versions prior to 6.73; EA9-T15CL versions prior to 6.73; EA9-RHMI versions prior to 6.73; EA9-PGMSW versions prior to 6.73;
Published: 2022-08-31
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

AutomationDirect recommends users upgrade to firmware Version 6.73 or later, which supports TLS security options for the webserver. While automation networks and systems have built-in password protection schemes, this is only one step in securing the affected systems. Automation control system networks must incorporate data protection and security measures at least as robust as a typical business computer system. AutomationDirect recommends users of PLCs, HMI products, and other SCADA system products perform independent network security analysis to determine the proper level of security required for the application. AutomationDirect has identified the following mitigations for instances where systems cannot be upgraded to Version 6.73 or later: The Webserver feature can be disabled on the HMI using the programming software. Place the HMI panel behind a VPN: Access to and from critical control system assets in the modern environment is usually LAN based, but still should be considered remote if the operator is traversing across different networks. virtual private networking (VPN) is often considered the best approach in securing trans-network communication.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-34311 AutomationDirect C-more EA9 HTTP webserver uses an insecure mechanism to transport credentials from client to web server, which may allow an attacker to obtain the login credentials and login as a valid user. This issue affects: AutomationDirect C-more EA9 EA9-T6CL versions prior to 6.73; EA9-T6CL-R versions prior to 6.73; EA9-T7CL versions prior to 6.73; EA9-T7CL-R versions prior to 6.73; EA9-T8CL versions prior to 6.73; EA9-T10CL versions prior to 6.73; EA9-T10WCL versions prior to 6.73; EA9-T12CL versions prior to 6.73; EA9-T15CL versions prior to 6.73; EA9-RHMI versions prior to 6.73; EA9-PGMSW versions prior to 6.73;
History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Automationdirect C-more Ea9-pgmsw C-more Ea9-pgmsw Firmware C-more Ea9-rhmi C-more Ea9-rhmi Firmware C-more Ea9-t10cl C-more Ea9-t10cl Firmware C-more Ea9-t10wcl C-more Ea9-t10wcl Firmware C-more Ea9-t12cl C-more Ea9-t12cl Firmware C-more Ea9-t15cl C-more Ea9-t15cl-r C-more Ea9-t15cl-r Firmware C-more Ea9-t15cl Firmware C-more Ea9-t6cl C-more Ea9-t6cl-r C-more Ea9-t6cl-r Firmware C-more Ea9-t6cl Firmware C-more Ea9-t7cl C-more Ea9-t7cl-r C-more Ea9-t7cl-r Firmware C-more Ea9-t7cl Firmware C-more Ea9-t8cl C-more Ea9-t8cl Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:11:43.495Z

Reserved: 2022-06-06T00:00:00.000Z

Link: CVE-2022-2005

cve-icon Vulnrichment

Updated: 2024-08-03T00:24:43.894Z

cve-icon NVD

Status : Modified

Published: 2022-08-31T16:15:10.523

Modified: 2024-11-21T07:00:09.717

Link: CVE-2022-2005

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses