AutomationDirect C-more EA9 HMI

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 9.3
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: AutomationDirect
  • Equipment: C-more EA9 HMI
  • Vulnerability: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition or achieve remote code execution on the affected device.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following Automation Direct products are affected:

  • C-more EA9 HMI EA9-T6CL: v6.79 and prior
  • C-more EA9 HMI EA9-T7CL-R: v6.79 and prior
  • C-more EA9 HMI EA9-T7CL: v6.79 and prior
  • C-more EA9 HMI EA9-T8CL: v6.79 and prior
  • C-more EA9 HMI EA9-T10CL: v6.79 and prior
  • C-more EA9 HMI EA9-T10WCL: v6.79 and prior
  • C-more EA9 HMI EA9-T12CL: v6.79 and prior
  • C-more EA9 HMI EA9-T15CL-R: v6.79 and prior
  • C-more EA9 HMI EA9-T15CL: v6.79 and prior
  • C-more EA9 HMI EA9-RHMI: v6.79 and prior

3.2 VULNERABILITY OVERVIEW

3.2.1 Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) CWE-120

AutomationDirect C-more EA9 HMI contains a function with bounds checks that can be skipped, which could result in an attacker abusing the function to cause a denial-of-service condition or achieving remote code execution on the affected device.

CVE-2025-0960 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for This article has been indexed from All CISA Advisories

Read the original article:

AutomationDirect C-more EA9 HMI