First published: Tue Feb 04 2025(Updated: )
AutomationDirect C-more EA9 HMI contains a function with bounds checks that can be skipped, which could result in an attacker abusing the function to cause a denial-of-service condition or achieving remote code execution on the affected device.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
AutomationDirect C-more EA9 HMI | ||
AutomationDirect C-more EA9 HMI | ||
AutomationDirect C-more EA9 HMI | ||
AutomationDirect C-more EA9 HMI | ||
AutomationDirect C-more EA9 HMI | ||
AutomationDirect C-more EA9 HMI | ||
AutomationDirect C-more EA9 HMI | ||
AutomationDirect C-more EA9 HMI | ||
AutomationDirect C-more EA9 HMI | ||
AutomationDirect C-more EA9 HMI | ||
AutomationDirect C-more EA9 HMI |
AutomationDirect recommends that users update C-MORE EA9 HMI software and firmware to V6.80 https://support.automationdirect.com/firmware/historydetail.php .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0960 has been rated with a high severity level due to its potential to cause denial-of-service or remote code execution.
To fix CVE-2025-0960, update the AutomationDirect C-more EA9 HMI to the latest version that addresses this vulnerability.
CVE-2025-0960 affects all versions prior to v6.79 of the AutomationDirect C-more EA9 HMI.
The impact of CVE-2025-0960 includes a risk of denial-of-service conditions and the possibility of remote code execution on the affected devices.
Currently, there are no documented workarounds for CVE-2025-0960, so upgrading to a secure version is advised.