CVE-2025-0960

AutomationDirect C-more EA9 HMI Classic Buffer Overflow

Description

AutomationDirect C-more EA9 HMI contains a function with bounds checks that can be skipped, which could result in an attacker abusing the function to cause a denial-of-service condition or achieving remote code execution on the affected device.

Remediation

Solution:

  • AutomationDirect recommends that users update C-MORE EA9 HMI software and firmware to V6.80 https://support.automationdirect.com/firmware/historydetail.php .

Workaround:

  • If an immediate update is not feasible, AutomationDirect recommends considering the following interim steps until the programming software can be updated: * Isolate the HMI Workstation: Disconnect the HMI from external networks (e.g., internet or corporate LAN) to limit exposure to external threats. * Use dedicated, secure internal networks or air-gapped systems for communication with programmable devices. * Control Access: Restrict physical and logical access to the HMI to authorized personnel only. * Implement Whitelisting: Use application whitelisting to allow only pre-approved and trusted software to execute on the HMI. Block untrusted or unauthorized applications. * Apply Endpoint Security Measures: Use antivirus or endpoint detection and response (EDR) tools to monitor for and mitigate threats. Ensure that host-based firewalls are properly configured to block unauthorized access. * Monitor and Log Activity: Enable logging and monitoring of system activities to detect potential anomalies or unauthorized actions. Regularly review logs for suspicious activity. * Use Secure Backup and Recovery: Regularly back up the workstation and its configurations to a secure location. Test recovery procedures to ensure minimal downtime in the event of an incident. * Conduct Regular Risk Assessments: Continuously assess the risks posed by the outdated software and adjust mitigation measures as necessary.

Category

9.3
CVSS
Severity: Critical
CVSS 4.0 •
CVSS 3.1 •
EPSS 0.27%
Affected: AutomationDirect C-more EA9 HMI EA9-T6CL
Affected: AutomationDirect C-more EA9 HMI EA9-T7CL-R
Affected: AutomationDirect C-more EA9 HMI EA9-T7CL
Affected: AutomationDirect C-more EA9 HMI EA9-T8CL
Affected: AutomationDirect C-more EA9 HMI EA9-T10CL
Affected: AutomationDirect C-more EA9 HMI EA9-T10WCL
Affected: AutomationDirect C-more EA9 HMI EA9-T12CL
Affected: AutomationDirect C-more EA9 HMI EA9-T15CL-R
Affected: AutomationDirect C-more EA9 HMI EA9-T15CL
Affected: AutomationDirect C-more EA9 HMI EA9-RHMI
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-0960?
CVE-2025-0960 has been scored as a critical severity vulnerability.
How to fix CVE-2025-0960?
To fix CVE-2025-0960: AutomationDirect recommends that users update C-MORE EA9 HMI software and firmware to V6.80 https://support.automationdirect.com/firmware/historydetail.php .
Is CVE-2025-0960 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-0960 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-0960?
CVE-2025-0960 affects AutomationDirect C-more EA9 HMI EA9-T6CL, AutomationDirect C-more EA9 HMI EA9-T7CL-R, AutomationDirect C-more EA9 HMI EA9-T7CL, AutomationDirect C-more EA9 HMI EA9-T8CL, AutomationDirect C-more EA9 HMI EA9-T10CL, AutomationDirect C-more EA9 HMI EA9-T10WCL, AutomationDirect C-more EA9 HMI EA9-T12CL, AutomationDirect C-more EA9 HMI EA9-T15CL-R, AutomationDirect C-more EA9 HMI EA9-T15CL, AutomationDirect C-more EA9 HMI EA9-RHMI.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.