AutomationDirect DirectLOGIC with Ethernet
AutomationDirect DirectLOGIC Ethernet modules contain two vulnerabilities: (1) CVE-2022-2003 allows remote attackers to extract the Ethernet module password via a specially crafted message without authentication, and (2) CVE-2022-2004 allows denial-of-service. The password vulnerability could enable unauthorized reconfiguration of the PLC logic or process parameters. Affected models include D0-06 series, DL05 series, D2-240/250/250-1/260/262, and D4-430/440/450/454. The updated firmware includes a 3-hour password lockout after three failed attempts and will no longer respond with the password to the crafted request.
- Network reachability to the Ethernet module on the DirectLOGIC PLC
- No authentication or credentials required to trigger the vulnerability
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2066d97d-ffa8-48bf-bc2a-0d927a7f70a7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.