The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-58429

CVE-2025-58429: Productivity Suite Path Traversal Flaw

CVE-2025-58429 is a path traversal vulnerability in Productivity Suite 4.4.1.19 that enables unauthenticated attackers to delete arbitrary files remotely. This article covers technical details, affected versions, and mitigation.

Updated: May 11, 2026

CVE-2025-58429 Overview

CVE-2025-58429 is a relative path traversal vulnerability [CWE-23] in AutomationDirect Productivity Suite version 4.4.1.19. The flaw resides in the ProductivityService PLC simulator component. An unauthenticated remote attacker can interact with the service and delete arbitrary files on the host running the software. The issue is tracked in CISA ICS Advisory ICSA-25-296-01 and affects engineering workstations used to develop and simulate programmable logic controller (PLC) projects.

Critical Impact

Unauthenticated remote attackers can delete arbitrary files on systems running the vulnerable Productivity Suite, disrupting PLC project files, engineering workflows, and supporting operating system components.

Affected Products

  • AutomationDirect Productivity Suite version 4.4.1.19
  • ProductivityService PLC simulator component
  • Engineering workstations running the affected software

Discovery Timeline

  • 2025-10-23 - CVE-2025-58429 published to NVD
  • 2026-04-15 - Last updated in NVD database

Technical Details for CVE-2025-58429

Vulnerability Analysis

The vulnerability is a relative path traversal classified under [CWE-23]. The ProductivityService, a network-facing simulator process bundled with Productivity Suite, accepts file path input from remote clients without sufficient validation. An attacker can supply path traversal sequences such as ..\ or ../ to escape the intended working directory. The service then performs file deletion against the resolved location.

Because the service exposes this functionality over the network without authentication, the attacker does not need credentials or user interaction. The impact is concentrated on integrity and availability: arbitrary files reachable by the service account can be removed, which can corrupt PLC projects, break the simulator runtime, or damage operating system files. Confidentiality is not directly impacted, but downstream effects on industrial control system (ICS) operations can be significant.

Root Cause

The root cause is missing canonicalization and validation of user-supplied file paths before passing them to file system delete operations. The service does not restrict resolved paths to an allow-listed base directory, allowing relative traversal sequences to reach arbitrary locations on disk.

Attack Vector

The attack vector is network-based and requires no authentication or user interaction. An attacker with reachability to the ProductivityService listener sends a crafted request containing traversal sequences in a file path parameter. The service resolves the path and deletes the targeted file. See CISA ICS Advisory ICSA-25-296-01 for protocol-level details.

No verified public exploit code is available. The vulnerability mechanism is described in prose only; refer to the GitHub CSAF Document for the authoritative advisory.

Detection Methods for CVE-2025-58429

Indicators of Compromise

  • Unexpected deletion of files within Productivity Suite project directories or adjacent operating system paths.
  • Inbound network connections to the ProductivityService listener from unknown or external sources.
  • Application or simulator crashes following remote interaction with the service.
  • Windows Security or Sysmon FileDelete events originating from the Productivity Suite service process targeting files outside its expected working directory.

Detection Strategies

  • Monitor process-level file deletion events from the ProductivityService binary and alert when target paths contain ..\ or ../ sequences or resolve outside the install directory.
  • Inspect network traffic to the ProductivityService port for path parameters containing traversal patterns.
  • Correlate file deletion events on engineering workstations with concurrent network sessions to the simulator service.

Monitoring Recommendations

  • Enable file system auditing on the Productivity Suite installation directory and parent paths.
  • Forward endpoint telemetry from engineering workstations to a centralized SIEM for correlation with ICS network logs.
  • Track availability of PLC project files via integrity monitoring to surface unauthorized deletions quickly.

How to Mitigate CVE-2025-58429

Immediate Actions Required

  • Restrict network access to engineering workstations running Productivity Suite using host firewalls and network segmentation, per AutomationDirect Security Considerations.
  • Block external reachability to the ProductivityService listener and limit inbound connections to trusted engineering hosts only.
  • Place affected systems behind ICS demilitarized zones (DMZs) and require VPN access for remote engineering work.
  • Back up PLC project files and engineering data to offline storage to enable recovery from unauthorized deletion.

Patch Information

AutomationDirect provides updated software via the AutomationDirect Software Downloads portal. Apply the vendor-supplied fixed version as documented in CISA ICS Advisory ICSA-25-296-01. Verify the installed version is later than 4.4.1.19 after upgrade.

Workarounds

  • Disable the PLC simulator service when not actively in use for development or testing.
  • Enforce strict host firewall rules permitting connections to the simulator only from localhost or designated engineering IP addresses.
  • Operate Productivity Suite under a low-privilege Windows account to limit the file scope reachable for deletion.
  • Isolate engineering workstations from operational technology (OT) networks and the public internet in line with CISA defense-in-depth guidance.
bash
# Example Windows Firewall rule restricting ProductivityService inbound access to localhost
netsh advfirewall firewall add rule name="Block ProductivityService External" ^
  dir=in action=block program="C:\Program Files\AutomationDirect\Productivity Suite\ProductivityService.exe" ^
  enable=yes profile=any

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePath Traversal

  • Vendor/TechProductivity Suite

  • SeverityHIGH

  • CVSS Score8.3

  • EPSS Probability0.58%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-23
  • Technical References
  • GitHub CSAF Document

  • AutomationDirect Security Considerations

  • AutomationDirect Software Downloads

  • CISA ICS Advisory ICSA-25-296-01
  • Related CVEs
  • CVE-2025-58078: Productivity Suite Path Traversal Flaw

  • CVE-2025-61934: Productivity Suite RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English