CVE-2022-2006 – AutomationDirect C-more EA9 HMI Uncontrolled Search Path Element
https://notcve.org/view.php?id=CVE-2022-2006
AutomationDirect DirectLOGIC has a DLL vulnerability in the install directory that may allow an attacker to execute code during the installation process. This issue affects: AutomationDirect C-more EA9 EA9-T6CL versions prior to 6.73; EA9-T6CL-R versions prior to 6.73; EA9-T7CL versions prior to 6.73; EA9-T7CL-R versions prior to 6.73; EA9-T8CL versions prior to 6.73; EA9-T10CL versions prior to 6.73; EA9-T10WCL versions prior to 6.73; EA9-T12CL versions prior to 6.73; EA9-T15CL versions prior to 6.73; EA9-RHMI versions prior to 6.73; EA9-PGMSW versions prior to 6.73; AutomationDirect DirectLOGIC presenta una vulnerabilidad de DLL en el directorio de instalación que puede permitir a un atacante ejecutar código durante el proceso de instalación. Este problema afecta a: AutomationDirect C-more EA9 EA9-T6CL versiones anteriores a 6.73; EA9-T6CL-R versiones anteriores a 6.73; EA9-T7CL versiones anteriores a 6.73; EA9-T7CL-R versiones anteriores a 6.73; EA9-T8CL versiones anteriores a 6. 73; EA9-T10CL versiones anteriores a 6.73; EA9-T10WCL versiones anteriores a 6.73; EA9-T12CL versiones anteriores a 6.73; EA9-T15CL versiones anteriores a 6.73; EA9-RHMI versiones anteriores a 6.73; EA9-PGMSW versiones anteriores a 6.73; • https://www.cisa.gov/uscert/ics/advisories/icsa-22-167-01 • CWE-427: Uncontrolled Search Path Element •
CVE-2022-2005 – AutomationDirect C-more EA9 HMI Cleartext Transmission
https://notcve.org/view.php?id=CVE-2022-2005
AutomationDirect C-more EA9 HTTP webserver uses an insecure mechanism to transport credentials from client to web server, which may allow an attacker to obtain the login credentials and login as a valid user. This issue affects: AutomationDirect C-more EA9 EA9-T6CL versions prior to 6.73; EA9-T6CL-R versions prior to 6.73; EA9-T7CL versions prior to 6.73; EA9-T7CL-R versions prior to 6.73; EA9-T8CL versions prior to 6.73; EA9-T10CL versions prior to 6.73; EA9-T10WCL versions prior to 6.73; EA9-T12CL versions prior to 6.73; EA9-T15CL versions prior to 6.73; EA9-RHMI versions prior to 6.73; EA9-PGMSW versions prior to 6.73; El servidor web HTTP de AutomationDirect C-more EA9 usa un mecanismo inseguro para transportar las credenciales del cliente al servidor web, lo que puede permitir a un atacante obtener las credenciales de inicio de sesión e iniciar sesión como un usuario válido. Este problema afecta a: AutomationDirect C-more EA9 versiones EA9-T6CL anteriores a la 6.73; EA9-T6CL-R versiones anteriores a la 6.73; EA9-T7CL versiones anteriores a la 6.73; EA9-T7CL-R versiones anteriores a la 6.73; EA9-T8CL versiones anteriores a la 6. 73; EA9-T10CL versiones anteriores a 6.73; EA9-T10WCL versiones anteriores a 6.73; EA9-T12CL versiones anteriores a 6.73; EA9-T15CL versiones anteriores a 6.73; EA9-RHMI versiones anteriores a 6.73; EA9-PGMSW versiones anteriores a 6.73; • https://www.cisa.gov/uscert/ics/advisories/icsa-22-167-01 • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2020-6969
https://notcve.org/view.php?id=CVE-2020-6969
It is possible to unmask credentials and other sensitive information on “unprotected” project files, which may allow an attacker to remotely access the C-More Touch Panels EA9 series: firmware versions prior to 6.53 and manipulate system configurations. Es posible desenmascarar credenciales y otra información confidencial en archivos de proyecto "desprotegidos", lo que puede permitir a un atacante acceder de forma remota a la serie EA9 de C-More Touch Panels: versiones de firmware anteriores a la versión 6.53 y manipular las configuraciones del sistema. • https://www.us-cert.gov/ics/advisories/icsa-20-035-01 • CWE-522: Insufficiently Protected Credentials •