Search criteria
3 vulnerabilities found for p3-550 by automationdirect
VAR-202405-1997
Vulnerability from variot - Updated: 2025-02-16 22:29A write-what-where vulnerability exists in the Programming Software Connection Remote Memory Diagnostics functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to an arbitrary write. An attacker can send an unauthenticated packet to trigger this vulnerability. P3-550E firmware, P3-550 firmware, P3-530 firmware etc. AutomationDirect There are unspecified vulnerabilities in the product.Information is tampered with and service operation is interrupted (DoS) It may be in a state. AutomationDirect P3-550E is a programmable control system (PLC) of AutomationDirect, Inc. of the United States
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202405-1997",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "p3-550e",
"scope": "eq",
"trust": 1.6,
"vendor": "automationdirect",
"version": "1.2.10.9"
},
{
"model": "p1-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.10"
},
{
"model": "p3-550e",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p3-530",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p1-540",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.10"
},
{
"model": "p1-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p3-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p1-540",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p2-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.10"
},
{
"model": "p3-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.9"
},
{
"model": "p3-530",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.9"
},
{
"model": "p2-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p1-540",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p3-550e",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p2-550",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p1-550",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p3-530",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p3-550",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34889"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018883"
},
{
"db": "NVD",
"id": "CVE-2024-22187"
}
]
},
"cve": "CVE-2024-22187",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.4,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-34889",
"impactScore": 9.2,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "talos-cna@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-22187",
"impactScore": 5.2,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 9.1,
"baseSeverity": "Critical",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2024-018883",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "talos-cna@cisco.com",
"id": "CVE-2024-22187",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "OTHER",
"id": "JVNDB-2024-018883",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2024-34889",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34889"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018883"
},
{
"db": "NVD",
"id": "CVE-2024-22187"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A write-what-where vulnerability exists in the Programming Software Connection Remote Memory Diagnostics functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to an arbitrary write. An attacker can send an unauthenticated packet to trigger this vulnerability. P3-550E firmware, P3-550 firmware, P3-530 firmware etc. AutomationDirect There are unspecified vulnerabilities in the product.Information is tampered with and service operation is interrupted (DoS) It may be in a state. AutomationDirect P3-550E is a programmable control system (PLC) of AutomationDirect, Inc. of the United States",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-22187"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018883"
},
{
"db": "CNVD",
"id": "CNVD-2024-34889"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-22187",
"trust": 3.2
},
{
"db": "TALOS",
"id": "TALOS-2024-1940",
"trust": 2.4
},
{
"db": "ICS CERT",
"id": "ICSA-24-144-01",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU96926054",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018883",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-34889",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34889"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018883"
},
{
"db": "NVD",
"id": "CVE-2024-22187"
}
]
},
"id": "VAR-202405-1997",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34889"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34889"
}
]
},
"last_update_date": "2025-02-16T22:29:28.182000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for AutomationDirect P3-550E Access Control Error Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/576376"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34889"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-284",
"trust": 1.0
},
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "Inappropriate access control (CWE-284) [ others ]",
"trust": 0.8
},
{
"problemtype": " others (CWE-Other) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-018883"
},
{
"db": "NVD",
"id": "CVE-2024-22187"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://talosintelligence.com/vulnerability_reports/talos-2024-1940"
},
{
"trust": 1.8,
"url": "https://community.automationdirect.com/s/internal-database-security-advisory/a4gpe0000003yxv2ay/sa00036"
},
{
"trust": 1.8,
"url": "https://www.talosintelligence.com/vulnerability_reports/talos-2024-1940"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu96926054/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-22187"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-144-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34889"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018883"
},
{
"db": "NVD",
"id": "CVE-2024-22187"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-34889"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018883"
},
{
"db": "NVD",
"id": "CVE-2024-22187"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-08-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-34889"
},
{
"date": "2025-02-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-018883"
},
{
"date": "2024-05-28T16:15:12.330000",
"db": "NVD",
"id": "CVE-2024-22187"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-08-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-34889"
},
{
"date": "2025-02-13T01:59:00",
"db": "JVNDB",
"id": "JVNDB-2024-018883"
},
{
"date": "2025-02-12T17:30:21.533000",
"db": "NVD",
"id": "CVE-2024-22187"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0AutomationDirect\u00a0 Product vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-018883"
}
],
"trust": 0.8
}
}
VAR-202405-2022
Vulnerability from variot - Updated: 2025-02-16 22:29A read-what-where vulnerability exists in the Programming Software Connection IMM 01A1 Memory Read functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to a disclosure of sensitive information. An attacker can send an unauthenticated packet to trigger this vulnerability. P3-550E firmware, P3-550 firmware, P3-530 firmware etc. AutomationDirect There are unspecified vulnerabilities in the product.Information may be obtained. AutomationDirect P3-550E is a programmable control system (PLC) of AutomationDirect, Inc. of the United States
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202405-2022",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "p3-550e",
"scope": "eq",
"trust": 1.6,
"vendor": "automationdirect",
"version": "1.2.10.9"
},
{
"model": "p1-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.10"
},
{
"model": "p3-550e",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p3-530",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p1-540",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.10"
},
{
"model": "p1-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p3-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p1-540",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p2-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.10"
},
{
"model": "p3-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.9"
},
{
"model": "p3-530",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.9"
},
{
"model": "p2-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p1-540",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p3-550e",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p2-550",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p1-550",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p3-530",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p3-550",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34888"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018908"
},
{
"db": "NVD",
"id": "CVE-2024-23315"
}
]
},
"cve": "CVE-2024-23315",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-34888",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "talos-cna@cisco.com",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2024-23315",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "OTHER",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2024-018908",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "talos-cna@cisco.com",
"id": "CVE-2024-23315",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "OTHER",
"id": "JVNDB-2024-018908",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2024-34888",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34888"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018908"
},
{
"db": "NVD",
"id": "CVE-2024-23315"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A read-what-where vulnerability exists in the Programming Software Connection IMM 01A1 Memory Read functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to a disclosure of sensitive information. An attacker can send an unauthenticated packet to trigger this vulnerability. P3-550E firmware, P3-550 firmware, P3-530 firmware etc. AutomationDirect There are unspecified vulnerabilities in the product.Information may be obtained. AutomationDirect P3-550E is a programmable control system (PLC) of AutomationDirect, Inc. of the United States",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-23315"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018908"
},
{
"db": "CNVD",
"id": "CNVD-2024-34888"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-23315",
"trust": 3.2
},
{
"db": "TALOS",
"id": "TALOS-2024-1941",
"trust": 2.4
},
{
"db": "ICS CERT",
"id": "ICSA-24-144-01",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU96926054",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018908",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-34888",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34888"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018908"
},
{
"db": "NVD",
"id": "CVE-2024-23315"
}
]
},
"id": "VAR-202405-2022",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34888"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34888"
}
]
},
"last_update_date": "2025-02-16T22:29:28.144000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for AutomationDirect P3-550E Access Control Error Vulnerability (CNVD-2024-34888)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/576381"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34888"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-284",
"trust": 1.0
},
{
"problemtype": "Inappropriate access control (CWE-284) [ others ]",
"trust": 0.8
},
{
"problemtype": " Lack of information (CWE-noinfo) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-018908"
},
{
"db": "NVD",
"id": "CVE-2024-23315"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://talosintelligence.com/vulnerability_reports/talos-2024-1941"
},
{
"trust": 1.8,
"url": "https://community.automationdirect.com/s/internal-database-security-advisory/a4gpe0000003yz72ai/sa00037"
},
{
"trust": 1.8,
"url": "https://www.talosintelligence.com/vulnerability_reports/talos-2024-1941"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu96926054/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-23315"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-144-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34888"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018908"
},
{
"db": "NVD",
"id": "CVE-2024-23315"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-34888"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018908"
},
{
"db": "NVD",
"id": "CVE-2024-23315"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-08-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-34888"
},
{
"date": "2025-02-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-018908"
},
{
"date": "2024-05-28T16:15:12.663000",
"db": "NVD",
"id": "CVE-2024-23315"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-08-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-34888"
},
{
"date": "2025-02-13T02:39:00",
"db": "JVNDB",
"id": "JVNDB-2024-018908"
},
{
"date": "2025-02-12T17:30:29.620000",
"db": "NVD",
"id": "CVE-2024-23315"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0AutomationDirect\u00a0 Product vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-018908"
}
],
"trust": 0.8
}
}
VAR-202405-1919
Vulnerability from variot - Updated: 2025-02-16 22:29A heap-based buffer overflow vulnerability exists in the Programming Software Connection CurrDir functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger these vulnerability.This CVE tracks the heap corruption that occurs at offset 0xb686c of version 1.2.10.9 of the P3-550E firmware, which occurs when a call to memset relies on an attacker-controlled length value and corrupts any trailing heap allocations. P3-550E firmware, P3-550 firmware, P3-530 firmware etc. AutomationDirect The product contains a vulnerability related to out-of-bounds writes.Information is tampered with and service operation is interrupted (DoS) It may be in a state. AutomationDirect P3-550E is a programmable control system (PLC) of AutomationDirect, Inc., USA
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202405-1919",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "p3-550e",
"scope": "eq",
"trust": 1.6,
"vendor": "automationdirect",
"version": "1.2.10.9"
},
{
"model": "p1-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.10"
},
{
"model": "p3-550e",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p3-530",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p1-540",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.10"
},
{
"model": "p1-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p3-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p1-540",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p2-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.10"
},
{
"model": "p3-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.9"
},
{
"model": "p3-530",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "1.2.10.9"
},
{
"model": "p2-550",
"scope": "eq",
"trust": 1.0,
"vendor": "automationdirect",
"version": "4.1.1.10"
},
{
"model": "p1-540",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p3-550e",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p2-550",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p1-550",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p3-530",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
},
{
"model": "p3-550",
"scope": null,
"trust": 0.8,
"vendor": "automationdirect",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34887"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018884"
},
{
"db": "NVD",
"id": "CVE-2024-24946"
}
]
},
"cve": "CVE-2024-24946",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2024-34887",
"impactScore": 7.8,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "talos-cna@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2024-24946",
"impactScore": 4.2,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 8.2,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2024-018884",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "talos-cna@cisco.com",
"id": "CVE-2024-24946",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "OTHER",
"id": "JVNDB-2024-018884",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2024-34887",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34887"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018884"
},
{
"db": "NVD",
"id": "CVE-2024-24946"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A heap-based buffer overflow vulnerability exists in the Programming Software Connection CurrDir functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger these vulnerability.This CVE tracks the heap corruption that occurs at offset `0xb686c` of version 1.2.10.9 of the P3-550E firmware, which occurs when a call to `memset` relies on an attacker-controlled length value and corrupts any trailing heap allocations. P3-550E firmware, P3-550 firmware, P3-530 firmware etc. AutomationDirect The product contains a vulnerability related to out-of-bounds writes.Information is tampered with and service operation is interrupted (DoS) It may be in a state. AutomationDirect P3-550E is a programmable control system (PLC) of AutomationDirect, Inc., USA",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-24946"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018884"
},
{
"db": "CNVD",
"id": "CNVD-2024-34887"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-24946",
"trust": 3.2
},
{
"db": "TALOS",
"id": "TALOS-2024-1937",
"trust": 2.4
},
{
"db": "ICS CERT",
"id": "ICSA-24-144-01",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU96926054",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018884",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2024-34887",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34887"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018884"
},
{
"db": "NVD",
"id": "CVE-2024-24946"
}
]
},
"id": "VAR-202405-1919",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34887"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34887"
}
]
},
"last_update_date": "2025-02-16T22:29:27.960000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for AutomationDirect P3-550E Out-of-Bounds Write Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/576371"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34887"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-018884"
},
{
"db": "NVD",
"id": "CVE-2024-24946"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://talosintelligence.com/vulnerability_reports/talos-2024-1937"
},
{
"trust": 1.8,
"url": "https://www.talosintelligence.com/vulnerability_reports/talos-2024-1937"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu96926054/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-24946"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-144-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2024-34887"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018884"
},
{
"db": "NVD",
"id": "CVE-2024-24946"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2024-34887"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-018884"
},
{
"db": "NVD",
"id": "CVE-2024-24946"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-08-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-34887"
},
{
"date": "2025-02-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-018884"
},
{
"date": "2024-05-28T16:15:13.383000",
"db": "NVD",
"id": "CVE-2024-24946"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2024-08-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2024-34887"
},
{
"date": "2025-02-13T02:05:00",
"db": "JVNDB",
"id": "JVNDB-2024-018884"
},
{
"date": "2025-02-12T18:34:36.453000",
"db": "NVD",
"id": "CVE-2024-24946"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0AutomationDirect\u00a0 Out-of-bounds write vulnerabilities in the product",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-018884"
}
],
"trust": 0.8
}
}