Description
Any attempt (good or bad) to log into AutomationDirect Stride Field I/O with a web browser may result in the device responding with its password in the communication packets.
Published: 2022-08-31
Score: 9.6 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

AutomationDirect recommends users upgrade the Stride Modbus Field I/O units listed in the affected products section with the firmware associated with the part number. Firmware can be downloaded from the AutomationDirect software downloads page. The modules with a listed B/N number in the affected products section have a firmware update issue and must be returned to AutomationDirect for replacement modules; users can create an RMA on the AutomationDirect website. Automation networks and systems may have built-in password protection schemes, but this is only one step in securing systems. Automation control system networks must incorporate data protection and security measures at least as robust as a typical business computer system. AutomationDirect recommends users of PLCs, HMI products and SCADA systems perform their own network security analysis to determine the proper level of security required for their application. See AutomationDirect product advisory number PA-COM-006 for more information.


Vendor Workaround

AutomationDirect has identified the specific mitigation actions listed below: Secure physical access. Isolate and air gap networks when possible. Follow the security considerations in the Automation Direct Security Considerations document. https://support.automationdirect.com/docs/securityconsiderations.pdf

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-34744 Any attempt (good or bad) to log into AutomationDirect Stride Field I/O with a web browser may result in the device responding with its password in the communication packets.
History

Wed, 16 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Automationdirect Sio-mb04ads Sio-mb04ads Firmware Sio-mb04das Sio-mb04das Firmware Sio-mb04rtds Sio-mb04rtds Firmware Sio-mb04thms Sio-mb04thms Firmware Sio-mb08ads-1 Sio-mb08ads-1 Firmware Sio-mb08ads-2 Sio-mb08ads-2 Firmware Sio-mb08thms Sio-mb08thms Firmware Sio-mb12cdr Sio-mb12cdr Firmware Sio-mb16cdd2 Sio-mb16cdd2 Firmware Sio-mb16nd3 Sio-mb16nd3 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T17:49:04.112Z

Reserved: 2022-07-19T00:00:00.000Z

Link: CVE-2022-2485

cve-icon Vulnrichment

Updated: 2024-08-03T00:39:07.846Z

cve-icon NVD

Status : Modified

Published: 2022-08-31T16:15:10.993

Modified: 2024-11-21T07:01:05.557

Link: CVE-2022-2485

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses