CVE-2024-23601
📋 TL;DR
A critical code injection vulnerability in AutomationDirect P3-550E's scan_lib.bin functionality allows attackers to execute arbitrary code by providing a malicious file. This affects P3-550E controllers running vulnerable firmware versions, potentially compromising industrial control systems.
💻 Affected Systems
- AutomationDirect P3-550E
📦 What is this software?
P1 540 Firmware by Automationdirect
P1 540 Firmware by Automationdirect
P1 550 Firmware by Automationdirect
P1 550 Firmware by Automationdirect
P2 550 Firmware by Automationdirect
P2 550 Firmware by Automationdirect
P3 530 Firmware by Automationdirect
P3 530 Firmware by Automationdirect
P3 550 Firmware by Automationdirect
P3 550 Firmware by Automationdirect
P3 550e Firmware by Automationdirect
P3 550e Firmware by Automationdirect
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to take full control of the PLC, manipulate industrial processes, disrupt operations, or establish persistence in OT networks.
Likely Case
Remote code execution leading to process manipulation, data theft, or denial of service in industrial environments.
If Mitigated
Limited impact if proper network segmentation and file validation controls prevent malicious file uploads.
🎯 Exploit Status
Exploitation requires file upload capability but no authentication; weaponization is likely given the critical nature and industrial control system impact.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for latest patched version
Vendor Advisory: https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003ycL2AQ/sa00039
Restart Required: Yes
Instructions:
1. Download latest firmware from AutomationDirect support portal. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Verify update completion and functionality.
🔧 Temporary Workarounds
Network Segmentation
allIsolate P3-550E devices in separate network segments with strict firewall rules
File Upload Restrictions
allImplement strict controls on file uploads to PLC devices
🧯 If You Can't Patch
- Implement strict network segmentation to isolate PLCs from untrusted networks
- Deploy intrusion detection systems monitoring for suspicious file uploads to PLC devices
🔍 How to Verify
Check if Vulnerable:
Check firmware version via device web interface or programming software; version 1.2.10.9 is confirmed vulnerable
Check Version:
Check via device web interface or AutomationDirect programming software version display
Verify Fix Applied:
Verify firmware version has been updated to patched version provided by vendor
📡 Detection & Monitoring
Log Indicators:
- Unexpected file uploads to scan_lib.bin
- Firmware modification attempts
- Unusual process execution on PLC
Network Indicators:
- Suspicious file transfers to PLC IP addresses
- Unexpected connections to PLC management interfaces
SIEM Query:
source="plc_logs" AND (event="file_upload" OR event="firmware_change") AND target="scan_lib.bin"
🔗 References
- https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003ycL2AQ/sa00039
- https://talosintelligence.com/vulnerability_reports/TALOS-2024-1943
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1943
- https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003ycL2AQ/sa00039
- https://talosintelligence.com/vulnerability_reports/TALOS-2024-1943
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1943