Metrics
Affected Vendors & Products
No advisories yet.
Solution
AutomationDirect recommends that users do the following: * Update the Productivity Suite programming software to version 4.5.0.x or higher. * Update the firmware of Productivity PLCs to the latest version. https://www.automationdirect.com/support/software-downloads * Although automation networks and systems come equipped with built-in password protection mechanisms, this represents a fraction of the security measures needed to safeguard these systems. * It is imperative that automation control system networks integrate data protection and security measures that match, if not exceed, the robustness of conventional business computer systems. * AutomationDirect advises users of PLCs, HMI products, and SCADA systems to conduct a thorough network security analysis to ascertain the appropriate level of security necessary for their specific application.
Workaround
AutomationDirect has identified the following mitigations for instances where systems cannot be upgraded to the latest version: * Physically disconnect the PLC from any external networks, including the internet, local area networks (LANs), and other interconnected systems. * Configure network segmentation to isolate the PLC from other devices and systems within the organization. * Implement firewall rules or network access control (NAC) policies to block incoming and outgoing traffic to the PLC. * Please refer to AutomationDirect's security considerations https://support.automationdirect.com/docs/securityconsiderations.pdf for additional information. * If you have any questions regarding this issue, please contact AutomationDirect Technical Support at 770-844-4200 or 800-633-0405 for further assistance.
Fri, 24 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Automationdirect
Automationdirect p1-540 Automationdirect p1-550 Automationdirect p2-550 Automationdirect p2-622 Automationdirect p3-530 Automationdirect p3-550e Automationdirect p3-622 Automationdirect productivity Suite |
|
| Vendors & Products |
Automationdirect
Automationdirect p1-540 Automationdirect p1-550 Automationdirect p2-550 Automationdirect p2-622 Automationdirect p3-530 Automationdirect p3-550e Automationdirect p3-622 Automationdirect productivity Suite |
Thu, 23 Oct 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary directories on the target machine. | |
| Title | AutomationDirect Productivity Suite Relative Path Traversal | |
| Weaknesses | CWE-23 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-10-24T14:27:12.716Z
Reserved: 2025-10-21T21:55:11.899Z
Link: CVE-2025-60023
Updated: 2025-10-24T14:27:09.393Z
Status : Received
Published: 2025-10-23T23:15:37.530
Modified: 2025-10-23T23:15:37.530
Link: CVE-2025-60023
No data.
OpenCVE Enrichment
Updated: 2025-10-24T10:16:45Z