CVE-2017-14020
Severity CVSS v4.0:
Pending analysis
Type:
CWE-427
Uncontrolled Search Path Element
Publication date:
13/11/2017
Last modified:
20/04/2025
Description
In AutomationDirect CLICK Programming Software (Part Number C0-PGMSW) Versions 2.10 and prior; C-More Programming Software (Part Number EA9-PGMSW) Versions 6.30 and prior; C-More Micro (Part Number EA-PGMSW) Versions 4.20.01.0 and prior; Do-more Designer Software (Part Number DM-PGMSW) Versions 2.0.3 and prior; GS Drives Configuration Software (Part Number GSOFT) Versions 4.0.6 and prior; SL-SOFT SOLO Temperature Controller Configuration Software (Part Number SL-SOFT) Versions 1.1.0.5 and prior; and DirectSOFT Programming Software Versions 6.1 and prior, an uncontrolled search path element (DLL Hijacking) vulnerability has been identified. To exploit this vulnerability, an attacker could rename a malicious DLL to meet the criteria of the application, and the application would not verify that the DLL is correct. Once loaded by the application, the DLL could run malicious code at the privilege level of the application.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:automationdirect:click_plc_firmware:*:*:*:*:*:*:*:* | 2.10 (including) | |
| cpe:2.3:h:automationdirect:click_plc:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:automationdirect:c-more_plc_firmware:*:*:*:*:*:*:*:* | 6.30 (including) | |
| cpe:2.3:h:automationdirect:c-more_plc:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:automationdirect:c-more_micro_firmware:*:*:*:*:*:*:*:* | 4.20.01.0 (including) | |
| cpe:2.3:h:automationdirect:c-more_micro:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:automationdirect:gs_drives_fimware:*:*:*:*:*:*:*:* | 4.0.6 (including) | |
| cpe:2.3:h:automationdirect:gs_drives:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:automationdirect:sl-soft_solo_temperature_controller_firmware:*:*:*:*:*:*:*:* | 1.1.0.5 (including) | |
| cpe:2.3:h:automationdirect:sl-soft_solo_temperature_controller:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



