Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

AutomationDirect — Vulnerabilities & Security Advisories 49

Browse all 49 CVE security advisories affecting AutomationDirect. AI-powered Chinese analysis, POCs, and references for each vulnerability.

AutomationDirect operates as a provider of industrial automation components, including programmable logic controllers, human-machine interfaces, and motion control systems, primarily serving manufacturing and process industries. Security assessments have identified forty-nine Common Vulnerabilities and Exposures (CVEs) associated with its product ecosystem, indicating a significant historical attack surface. The majority of these vulnerabilities stem from insecure default configurations, improper access control mechanisms, and cross-site scripting flaws within web-based management interfaces. While remote code execution incidents are less frequent, privilege escalation bugs have allowed unauthorized users to gain administrative access to critical control systems. Notably, the company has faced scrutiny regarding delayed patch cycles for legacy hardware, which remains widely deployed in operational technology environments. These findings highlight persistent challenges in securing embedded industrial devices, where maintaining backward compatibility often conflicts with implementing robust, modern security protocols.

CVE IDTitleCVSSSeverityPublished
CVE-2024-24955 AutomationDirect P3-550E 缓冲区错误漏洞 — P3-550ECWE-787 8.2 High2024-05-28
CVE-2024-24957 AutomationDirect P3-550E 缓冲区错误漏洞 — P3-550ECWE-787 8.2 High2024-05-28
CVE-2024-24958 AutomationDirect P3-550E 缓冲区错误漏洞 — P3-550ECWE-787 8.2 High2024-05-28
CVE-2024-24954 AutomationDirect P3-550E 缓冲区错误漏洞 — P3-550ECWE-787 8.2 High2024-05-28
CVE-2024-22187 AutomationDirect P3-550E 访问控制错误漏洞 — P3-550ECWE-284 9.1 Critical2024-05-28
CVE-2024-24963 AutomationDirect P3-550E 安全漏洞 — P3-550ECWE-121 9.8 Critical2024-05-28
CVE-2024-24962 AutomationDirect P3-550E 安全漏洞 — P3-550ECWE-121 9.8 Critical2024-05-28
CVE-2024-23315 AutomationDirect P3-550E 访问控制错误漏洞 — P3-550ECWE-284 7.5 High2024-05-28
CVE-2024-23601 AutomationDirect P3-550E 安全漏洞 — P3-550ECWE-345 9.8 Critical2024-05-28
CVE-2024-21785 AutomationDirect P3-550E 安全漏洞 — P3-550ECWE-489 9.8 Critical2024-05-28
CVE-2024-25138 AutomationDirect C-MORE EA9 HMI Plaintext Storage of a Password — C-MORE EA9 HMI EA9-T6CLCWE-256 6.5 Medium2024-03-26
CVE-2024-25137 AutomationDirect C-MORE EA9 HMI Stack-based Buffer Overflow — C-MORE EA9 HMI EA9-T6CLCWE-121 4.3 Medium2024-03-26
CVE-2024-25136 AutomationDirect C-MORE EA9 HMI Path Traversal — C-MORE EA9 HMI EA9-T6CLCWE-22 7.5 High2024-03-26
CVE-2022-2485 AutomationDirect Stride Field I/O Cleartext Transmission of Sensitive Information — SIO-MB04RTDSCWE-319 9.6 Critical2022-08-31
CVE-2022-2004 AutomationDirect DirectLOGIC with Ethernet Communication Uncontrolled Resource Consumption — DirectLOGIC D0-06 series CPUsCWE-400 7.5 High2022-08-31
CVE-2022-2003 AutomationDirect DirectLOGIC with Serial Communication Cleartext Transmission — DirectLOGIC D0-06 series CPUsCWE-319 7.7 High2022-08-31
CVE-2022-2006 AutomationDirect C-more EA9 HMI Uncontrolled Search Path Element — C-more EA9CWE-427 7.8 High2022-08-31
CVE-2022-2005 AutomationDirect C-more EA9 HMI Cleartext Transmission — C-more EA9CWE-319 7.5 High2022-08-31
CVE-2017-14020 多款AutomationDirect产品安全漏洞 — CLICK Programming Software (Part Number C0-PGMSW)CWE-427 7.8 -2017-11-13

This page lists every published CVE security advisory associated with AutomationDirect. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.