CVE-2024-11610

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on AutomationDirect C-More EA9 programming software installations. Attackers can exploit it by tricking users into opening malicious EAP9 files or visiting malicious web pages. The vulnerability affects users of C-More EA9 software who process untrusted EAP9 files.

💻 Affected Systems

Products:
  • AutomationDirect C-More EA9
Versions: All versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the EAP9 file parser component of the C-More EA9 programming software used for HMI/SCADA systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or system compromise of the workstation running C-More EA9 software, potentially allowing attackers to access sensitive engineering data or pivot to other systems.

🟢

If Mitigated

Limited impact with only the C-More EA9 process affected if proper application sandboxing and least privilege principles are implemented.

🌐 Internet-Facing: MEDIUM - While user interaction is required, attackers can host malicious files on websites or distribute via email, making internet-facing systems potentially vulnerable.
🏢 Internal Only: HIGH - Internal users frequently exchange engineering files, making social engineering attacks with malicious EAP9 files highly effective within industrial environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file or visiting malicious page) and knowledge of memory corruption techniques. The vulnerability was discovered by Zero Day Initiative (ZDI-CAN-24773).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-programming-software/

Restart Required: No

Instructions:

1. Visit the vendor advisory URL. 2. Download the latest version of C-More EA9 software. 3. Install the update following vendor instructions. 4. Verify the installation completed successfully.

🔧 Temporary Workarounds

Restrict EAP9 file handling

all

Configure systems to only allow trusted EAP9 files and block execution of untrusted files

Application control policies

windows

Implement application whitelisting to prevent unauthorized execution of C-More EA9 with untrusted files

🧯 If You Can't Patch

  • Implement strict file validation procedures for all EAP9 files before opening in C-More EA9
  • Isolate C-More EA9 workstations from critical networks and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check C-More EA9 version against vendor advisory. If using any version prior to the patched version, the system is vulnerable.

Check Version:

Open C-More EA9 software and check Help > About or refer to installed programs list in Windows

Verify Fix Applied:

Verify C-More EA9 has been updated to the patched version specified in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes of C-More EA9 software
  • Unusual file access patterns for EAP9 files
  • Process creation anomalies from C-More EA9

Network Indicators:

  • Downloads of EAP9 files from untrusted sources
  • Network connections initiated by C-More EA9 to unexpected destinations

SIEM Query:

Process:Name='C-More EA9' AND (EventID=1000 OR EventID=1001) OR FileAccess:Extension='.eap9' AND SourceIP NOT IN (trusted_ips)

🔗 References

📤 Share & Export