Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-34744 | Any attempt (good or bad) to log into AutomationDirect Stride Field I/O with a web browser may result in the device responding with its password in the communication packets. |
Solution
AutomationDirect recommends users upgrade the Stride Modbus Field I/O units listed in the affected products section with the firmware associated with the part number. Firmware can be downloaded from the AutomationDirect software downloads page. The modules with a listed B/N number in the affected products section have a firmware update issue and must be returned to AutomationDirect for replacement modules; users can create an RMA on the AutomationDirect website. Automation networks and systems may have built-in password protection schemes, but this is only one step in securing systems. Automation control system networks must incorporate data protection and security measures at least as robust as a typical business computer system. AutomationDirect recommends users of PLCs, HMI products and SCADA systems perform their own network security analysis to determine the proper level of security required for their application. See AutomationDirect product advisory number PA-COM-006 for more information.
Workaround
AutomationDirect has identified the specific mitigation actions listed below: Secure physical access. Isolate and air gap networks when possible. Follow the security considerations in the Automation Direct Security Considerations document. https://support.automationdirect.com/docs/securityconsiderations.pdf
Wed, 16 Apr 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:49:04.112Z
Reserved: 2022-07-19T00:00:00.000Z
Link: CVE-2022-2485

Updated: 2024-08-03T00:39:07.846Z

Status : Modified
Published: 2022-08-31T16:15:10.993
Modified: 2024-11-21T07:01:05.557
Link: CVE-2022-2485

No data.

No data.