Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58078: CWE-23 in AutomationDirect Productivity Suite

0
High
VulnerabilityCVE-2025-58078cvecve-2025-58078cwe-23
Published: Thu Oct 23 2025 (10/23/2025, 22:09:03 UTC)
Source: CVE Database V5
Vendor/Project: AutomationDirect
Product: Productivity Suite

Description

A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and write files with arbitrary data on the target machine.

AI-Powered Analysis

AILast updated: 10/31/2025, 06:50:38 UTC

Technical Analysis

CVE-2025-58078 is a relative path traversal vulnerability identified in AutomationDirect's Productivity Suite software version 4.4.1.19. The flaw resides in the ProductivityService PLC simulator component, which improperly validates file paths, allowing an unauthenticated remote attacker to craft requests that traverse directories and write arbitrary files on the host system. This vulnerability is classified under CWE-23 (Relative Path Traversal), indicating that the software fails to properly sanitize user-supplied input used in file path construction. The CVSS 4.0 base score is 8.3, reflecting high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality (VC:N), integrity (VI:L), and high impact on availability (VA:H). The scope is limited (SI:L) but the vulnerability allows an attacker to write arbitrary data files, which could be leveraged to execute malicious code, disrupt PLC simulation, or interfere with industrial control processes. No patches are currently listed, and no known exploits have been reported in the wild. The vulnerability's presence in industrial automation software makes it particularly concerning for operational technology environments, where availability and integrity are critical. The lack of authentication requirement and remote exploitability increase the risk profile significantly.

Potential Impact

For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors relying on AutomationDirect's Productivity Suite, this vulnerability could lead to severe operational disruptions. Unauthorized file writes could corrupt PLC simulation data, cause erroneous control commands, or enable persistent malware implantation within industrial control systems. This threatens the integrity and availability of industrial processes, potentially leading to production downtime, safety hazards, and financial losses. Confidentiality impact is limited but could escalate if attackers leverage the vulnerability to gain further system access. The ease of exploitation without authentication and user interaction increases the likelihood of attacks, particularly in environments where the ProductivityService is exposed or insufficiently segmented. Given Europe's strong industrial base and emphasis on operational technology security, this vulnerability poses a significant risk to maintaining safe and reliable industrial operations.

Mitigation Recommendations

1. Immediately restrict network access to the ProductivityService PLC simulator to trusted internal networks only, using firewalls and access control lists. 2. Implement strict network segmentation to isolate industrial control systems and their simulation environments from general IT networks and the internet. 3. Monitor network traffic for unusual file write operations or unexpected requests targeting the ProductivityService. 4. Apply vendor patches or updates as soon as they become available; engage with AutomationDirect support for timelines and interim fixes. 5. Conduct thorough security assessments of all industrial control software to identify and remediate similar path traversal or input validation issues. 6. Employ application-layer filtering or web application firewalls (WAFs) capable of detecting and blocking path traversal attempts. 7. Maintain robust backup and recovery procedures for PLC simulation data and configuration files to enable rapid restoration if compromised. 8. Train operational technology personnel to recognize signs of exploitation and respond promptly to incidents involving the Productivity Suite.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-10-21T21:55:11.872Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68faa8db50358b89bd6f0362

Added to database: 10/23/2025, 10:14:51 PM

Last enriched: 10/31/2025, 6:50:38 AM

Last updated: 12/6/2025, 11:55:30 PM

Views: 191

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats