CVE-2025-60023

4.0 MEDIUM

📋 TL;DR

A relative path traversal vulnerability in Productivity Suite software version 4.4.1.19 allows unauthenticated remote attackers to delete arbitrary directories via the ProductivityService PLC simulator. This affects organizations using AutomationDirect's Productivity Suite software for industrial control systems. The vulnerability requires network access to the affected service.

💻 Affected Systems

Products:
  • AutomationDirect Productivity Suite
Versions: 4.4.1.19
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the ProductivityService component used for PLC simulation. Systems with this service exposed to untrusted networks are at highest risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical system directories could be deleted, causing system instability, data loss, or disruption of industrial processes controlled by the PLC simulator.

🟠

Likely Case

Attackers delete application directories or configuration files, disrupting Productivity Suite functionality and requiring system restoration.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated systems with minimal operational disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated directory deletion via path traversal. No authentication required, making exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version from AutomationDirect

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-296-01

Restart Required: Yes

Instructions:

1. Download latest Productivity Suite from AutomationDirect support site. 2. Install update following vendor instructions. 3. Restart system to ensure service updates apply.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to ProductivityService to trusted hosts only

Configure firewall rules to block port 7890/tcp from untrusted networks

Service Disablement

windows

Disable ProductivityService if PLC simulation not required

sc stop ProductivityService
sc config ProductivityService start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Productivity Suite systems
  • Monitor for unauthorized directory deletion attempts and implement file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Check if Productivity Suite version 4.4.1.19 is installed and ProductivityService is running on port 7890

Check Version:

Check Productivity Suite About dialog or installed programs list

Verify Fix Applied:

Verify Productivity Suite version is updated beyond 4.4.1.19 and test directory deletion attempts fail

📡 Detection & Monitoring

Log Indicators:

  • Unexpected directory deletion events in system logs
  • ProductivityService access from unauthorized IP addresses

Network Indicators:

  • Traffic to port 7890/tcp from untrusted sources
  • Unusual file deletion patterns via network monitoring

SIEM Query:

source="ProductivityService" AND (event="delete" OR event="remove")

🔗 References

📤 Share & Export