Any attempt (good or bad) to log into AutomationDirect Stride Field I/O with a web browser may result in the device responding with its password in the communication packets.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-34744 Any attempt (good or bad) to log into AutomationDirect Stride Field I/O with a web browser may result in the device responding with its password in the communication packets.
Fixes

Solution

AutomationDirect recommends users upgrade the Stride Modbus Field I/O units listed in the affected products section with the firmware associated with the part number. Firmware can be downloaded from the AutomationDirect software downloads page. The modules with a listed B/N number in the affected products section have a firmware update issue and must be returned to AutomationDirect for replacement modules; users can create an RMA on the AutomationDirect website. Automation networks and systems may have built-in password protection schemes, but this is only one step in securing systems. Automation control system networks must incorporate data protection and security measures at least as robust as a typical business computer system. AutomationDirect recommends users of PLCs, HMI products and SCADA systems perform their own network security analysis to determine the proper level of security required for their application. See AutomationDirect product advisory number PA-COM-006 for more information.


Workaround

AutomationDirect has identified the specific mitigation actions listed below: Secure physical access. Isolate and air gap networks when possible. Follow the security considerations in the Automation Direct Security Considerations document. https://support.automationdirect.com/docs/securityconsiderations.pdf

History

Wed, 16 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T17:49:04.112Z

Reserved: 2022-07-19T00:00:00.000Z

Link: CVE-2022-2485

cve-icon Vulnrichment

Updated: 2024-08-03T00:39:07.846Z

cve-icon NVD

Status : Modified

Published: 2022-08-31T16:15:10.993

Modified: 2024-11-21T07:01:05.557

Link: CVE-2022-2485

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.