AutomationDirect Stride Field I/O
AutomationDirect Stride Modbus Field I/O modules contain an unencrypted credential storage vulnerability (CWE-319) that allows an attacker with network access to extract user credentials. Affected firmware versions include SIO-MB04ADS (<8.4.3.0), SIO-MB04DAS (<8.11.3.0), SIO-MB04RTDS (<8.3.4.0), SIO-MB04THMS (<8.5.4.0), SIO-MB08ADS-1 (<8.6.3.0), SIO-MB08ADS-2 (<8.7.3.0), SIO-MB08THMS (<8.8.4.0), SIO-MB12CDR (<8.0.4.0), SIO-MB16CDD2 (<8.1.4.0), and SIO-MB16ND3 (<8.2.4.00). Certain hardware batches (B/N 5714442222 for SIO-MB04ADS and SIO-MB12CDR, and B/N 57141862221 for SIO-MB04THMS) cannot be patched and require RMA replacement. Compromised credentials could enable an attacker to gain unauthorized access to the broader automation control system and modify process parameters or disable critical functions.
- Network access to the Stride Field I/O module (local network or adjacent segment, given CVSS vector AV:A)
- No authentication or special credentials required to trigger the vulnerability
- Module must be running affected firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fea69a63-d6a0-4cee-8dc6-c9e03bc4cfcdGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.