9.1
CVSSv3

CVE-2022-2003

Published: 31/08/2022 Updated: 06/09/2022
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

AutomationDirect DirectLOGIC is vulnerable to a specifically crafted serial message to the CPU serial port that will cause the PLC to respond with the PLC password in cleartext. This could allow an malicious user to access and make unauthorized changes. This issue affects: AutomationDirect DirectLOGIC D0-06 series CPUs D0-06DD1 versions before 2.72; D0-06DD2 versions before 2.72; D0-06DR versions before 2.72; D0-06DA versions before 2.72; D0-06AR versions before 2.72; D0-06AA versions before 2.72; D0-06DD1-D versions before 2.72; D0-06DD2-D versions before 2.72; D0-06DR-D versions before 2.72;

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

automationdirect d0-06dd1_firmware

automationdirect d0-06dd2_firmware

automationdirect d0-06dr_firmware

automationdirect d0-06da_firmware

automationdirect d0-06ar_firmware

automationdirect d0-06aa_firmware

automationdirect d0-06dd1-d_firmware

automationdirect d0-06dd2-d_firmware

automationdirect d0-06dr-d_firmware

Recent Articles

Botnet malware disguises itself as password cracker for industrial controllers
The Register • Jeff Burt • 01 Jan 1970

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Can't get into that machine? No problem, just trust this completely sketchy looking tool What do you want The Register to do for you?

Industrial engineers and operators are being lured into running backdoor malware disguised as tools for recovering access to work systems. These programs offer to crack passwords for specific programmable logic controllers, according to security shop Dragos this month. According to their online ads, the cracking tools can help unlock products from more than a dozen electronics manufacturing companies, including Siemens, Mitsubishi, Fuji, Panasonic, LG, and Omron. All you have to do is purchase t...