Home

Description

A binding to an unrestricted IP address vulnerability was discovered in Productivity Suite software version v4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and read, write, or delete arbitrary files and folders on the target machine

PUBLISHED Reserved 2025-10-21 | Published 2025-10-23 | Updated 2025-10-24 | Assigner icscert




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-1327

Product status

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

Default status
unaffected

Any version before SW v4.4.1.19
affected

Credits

Luca Borzacchiello of Nozomi Networks reported these vulnerabilities to AutomationDirect. finder

References

www.cisa.gov/news-events/ics-advisories/icsa-25-296-01

www.automationdirect.com/support/software-downloads

support.automationdirect.com/docs/securityconsiderations.pdf

github.com/...p/csaf_files/OT/white/2025/icsa-25-296-01.json

cve.org (CVE-2025-61934)

nvd.nist.gov (CVE-2025-61934)

Download JSON