AutomationDirect C-more EA9 HMI contains a function with bounds checks that can be skipped, which could result in an attacker abusing the function to cause a denial-of-service condition or achieving remote code execution on the affected device.
Fixes

Solution

AutomationDirect recommends that users update C-MORE EA9 HMI software and firmware to V6.80 https://support.automationdirect.com/firmware/historydetail.php .


Workaround

If an immediate update is not feasible, AutomationDirect recommends considering the following interim steps until the programming software can be updated: * Isolate the HMI Workstation: Disconnect the HMI from external networks (e.g., internet or corporate LAN) to limit exposure to external threats. * Use dedicated, secure internal networks or air-gapped systems for communication with programmable devices. * Control Access: Restrict physical and logical access to the HMI to authorized personnel only. * Implement Whitelisting: Use application whitelisting to allow only pre-approved and trusted software to execute on the HMI. Block untrusted or unauthorized applications. * Apply Endpoint Security Measures: Use antivirus or endpoint detection and response (EDR) tools to monitor for and mitigate threats. Ensure that host-based firewalls are properly configured to block unauthorized access. * Monitor and Log Activity: Enable logging and monitoring of system activities to detect potential anomalies or unauthorized actions. Regularly review logs for suspicious activity. * Use Secure Backup and Recovery: Regularly back up the workstation and its configurations to a secure location. Test recovery procedures to ensure minimal downtime in the event of an incident. * Conduct Regular Risk Assessments: Continuously assess the risks posed by the outdated software and adjust mitigation measures as necessary.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00303}

epss

{'score': 0.00383}


Tue, 04 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 04 Feb 2025 19:45:00 +0000

Type Values Removed Values Added
Description AutomationDirect C-more EA9 HMI contains a function with bounds checks that can be skipped, which could result in an attacker abusing the function to cause a denial-of-service condition or achieving remote code execution on the affected device.
Title AutomationDirect C-more EA9 HMI Classic Buffer Overflow
Weaknesses CWE-120
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-02-04T19:50:52.268Z

Reserved: 2025-01-31T22:04:58.932Z

Link: CVE-2025-0960

cve-icon Vulnrichment

Updated: 2025-02-04T19:50:48.384Z

cve-icon NVD

Status : Received

Published: 2025-02-04T20:15:50.103

Modified: 2025-02-04T20:15:50.103

Link: CVE-2025-0960

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.