AutomationDirect Stride Field I/O
AutomationDirect Stride Modbus Field I/O modules contain an unencrypted credential storage vulnerability (CWE-319) that allows an attacker with network access to extract user credentials. Affected firmware versions include SIO-MB04ADS (<8.4.3.0), SIO-MB04DAS (<8.11.3.0), SIO-MB04RTDS (<8.3.4.0), SIO-MB04THMS (<8.5.4.0), SIO-MB08ADS-1 (<8.6.3.0), SIO-MB08ADS-2 (<8.7.3.0), SIO-MB08THMS (<8.8.4.0), SIO-MB12CDR (<8.0.4.0), SIO-MB16CDD2 (<8.1.4.0), and SIO-MB16ND3 (<8.2.4.00). Certain hardware batches (B/N 5714442222 for SIO-MB04ADS and SIO-MB12CDR, and B/N 57141862221 for SIO-MB04THMS) cannot be patched and require RMA replacement. Compromised credentials could enable an attacker to gain unauthorized access to the broader automation control system and modify process parameters or disable critical functions.
- Network access to the Stride Field I/O module (local network or adjacent segment, given CVSS vector AV:A)
- No authentication or special credentials required to trigger the vulnerability
- Module must be running affected firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fea69a63-d6a0-4cee-8dc6-c9e03bc4cfcd