A read-what-where vulnerability exists in the Programming Software Connection IMM 01A1 Memory Read functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to a disclosure of sensitive information. An attacker can send an unauthenticated packet to trigger this vulnerability.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1941 | third party advisory exploit |
https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003yZ72AI/sa00037 | vendor advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1941 | third party advisory exploit |