AutomationDirect CLICK, C-More, C-More Micro, Do-more Designer, GS Drives, SL-Soft SOLO, DirectSOFT (Update B)
A code execution vulnerability exists in multiple AutomationDirect programming and configuration software products. The vulnerability requires local access to an engineering workstation and user interaction (such as opening a malicious file). Successful exploitation allows an attacker to execute arbitrary code with the privileges of the user running the software. This could allow modification of PLC logic, controller settings, or device firmware before changes are uploaded to field equipment. Affected products include CLICK Programming Software, C-More and C-More Micro Programming Software, Do-more Designer, DirectSOFT, GS Drives Configuration Software, and SL-Soft SOLO Configuration Software.
- Local access to an engineering workstation or shared folder
- Valid user account with ability to run the affected software
- User interaction required (opening a malicious file or performing an action)
- Attacker must have a way to deliver the malicious payload to the workstation (social engineering, compromised network share, email attachment)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5643dff6-09a9-4410-83be-e91fd08f6f83