SB2024052435 - Multiple vulnerabilities in AutomationDirect Productivity PLCs



SB2024052435 - Multiple vulnerabilities in AutomationDirect Productivity PLCs

Published: May 24, 2024

Security Bulletin ID SB2024052435
Severity
High
Patch available
YES
Number of vulnerabilities 15
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 93% Medium 7%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 15 secuirty vulnerabilities.


1) Out-of-bounds write (CVE-ID: CVE-2024-24958)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the Programming Software Connection FileSystem API functionality. A remote attacker can trigger an out-of-bounds write and perform a denial of service (DoS) attack.


2) Insufficient verification of data authenticity (CVE-ID: CVE-2024-23601)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to insufficient verification of data authenticity in the scan_lib.bin functionality. A remote attacker can execute arbitrary code on the target system.


3) Active Debug Code (CVE-ID: CVE-2024-21785)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the active debug code issue in the Telnet Diagnostic Interface functionality. A remote attacker can gain access to the target system.


4) Improper access control (CVE-ID: CVE-2024-23315)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to the read-what-where issue in the Programming Software Connection IMM 01A1 Memory Read functionality. A remote attacker can bypass implemented security restrictions and gain access to sensitive information.


5) Improper access control (CVE-ID: CVE-2024-22187)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to the write-what-where issue in the Programming Software Connection Remote Memory Diagnostics functionality. A remote attacker can bypass implemented security restrictions and cause arbitrary write.


6) Stack-based buffer overflow (CVE-ID: CVE-2024-24963)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the Programming Software Connection FileSelect functionality. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Stack-based buffer overflow (CVE-ID: CVE-2024-24962)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the Programming Software Connection FileSelect functionality. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


8) Out-of-bounds write (CVE-ID: CVE-2024-24959)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the Programming Software Connection FileSystem API functionality. A remote attacker can trigger an out-of-bounds write and perform a denial of service (DoS) attack.


9) Out-of-bounds write (CVE-ID: CVE-2024-24957)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the Programming Software Connection FileSystem API functionality. A remote attacker can trigger an out-of-bounds write and perform a denial of service (DoS) attack.


10) Out-of-bounds write (CVE-ID: CVE-2024-24956)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the Programming Software Connection FileSystem API functionality. A remote attacker can trigger an out-of-bounds write and perform a denial of service (DoS) attack.


11) Out-of-bounds write (CVE-ID: CVE-2024-24955)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the Programming Software Connection FileSystem API functionality. A remote attacker can trigger an out-of-bounds write and perform a denial of service (DoS) attack.


12) Out-of-bounds write (CVE-ID: CVE-2024-24954)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the Programming Software Connection FileSystem API functionality. A remote attacker can trigger an out-of-bounds write and perform a denial of service (DoS) attack.


13) Out-of-bounds write (CVE-ID: CVE-2024-24947)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the Programming Software Connection CurrDir functionality. A remote attacker can trigger an out-of-bounds write and perform a denial of service (DoS) attack.


14) Out-of-bounds write (CVE-ID: CVE-2024-24946)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the Programming Software Connection CurrDir functionality. A remote attacker can trigger an out-of-bounds write and perform a denial of service (DoS) attack.


15) Heap-based buffer overflow (CVE-ID: CVE-2024-24851)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the Programming Software Connection FiBurn functionality. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and cause a denial of service condition on the target system.


Remediation

Install update from vendor's website.