Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54855: CWE-312 Cleartext Storage of Sensitive Information in AutomationDirect CLICK PLUS C0-0x CPU firmware

0
Medium
VulnerabilityCVE-2025-54855cvecve-2025-54855cwe-312
Published: Tue Sep 23 2025 (09/23/2025, 22:01:25 UTC)
Source: CVE Database V5
Vendor/Project: AutomationDirect
Product: CLICK PLUS C0-0x CPU firmware

Description

Cleartext storage of sensitive information was discovered in Click Programming Software version v3.60. The vulnerability can be exploited by a local user with access to the file system, while an administrator session is active, to steal credentials stored in clear text.

AI-Powered Analysis

AILast updated: 10/01/2025, 00:46:56 UTC

Technical Analysis

CVE-2025-54855 is a medium-severity vulnerability identified in the firmware of AutomationDirect's CLICK PLUS C0-0x CPU, specifically within the Click Programming Software version 3.60. The core issue is the cleartext storage of sensitive information, notably credentials, within the system's file storage. This vulnerability arises from improper handling of sensitive data, classified under CWE-312 (Cleartext Storage of Sensitive Information). An attacker with local access to the file system and an active administrator session can exploit this flaw to retrieve credentials stored in clear text. The vulnerability requires a local attacker with high privileges (administrator) and partial user interaction, as indicated by the CVSS vector (AV:L/AC:L/AT:P/PR:H/UI:P). The impact on confidentiality is high since credentials can be stolen, but there is no direct impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been released yet. The vulnerability affects the firmware version 0 of the CLICK PLUS C0-0x CPU, which is used in industrial automation environments. Given the nature of the affected product—industrial control system (ICS) hardware—the risk extends to operational technology (OT) environments where unauthorized access to credentials could lead to further compromise or disruption of industrial processes.

Potential Impact

For European organizations, especially those operating in manufacturing, utilities, and critical infrastructure sectors that utilize AutomationDirect's CLICK PLUS C0-0x CPU devices, this vulnerability poses a tangible risk. The theft of credentials stored in cleartext could enable lateral movement within OT networks or unauthorized reconfiguration of industrial controllers, potentially leading to operational disruptions or safety hazards. Since the vulnerability requires local access with administrator privileges, the threat is more significant in environments where physical or network access controls are weak or where insider threats exist. The exposure of credentials could also facilitate subsequent attacks, such as privilege escalation or sabotage. Given Europe's strong emphasis on industrial cybersecurity and regulatory frameworks like NIS2, exploitation of this vulnerability could lead to compliance issues and reputational damage. The absence of patches increases the window of exposure, making timely mitigation critical.

Mitigation Recommendations

1. Restrict physical and network access to systems running CLICK PLUS C0-0x CPU firmware to trusted personnel only, enforcing strict access control policies. 2. Monitor and audit administrator sessions actively to detect any unauthorized access or suspicious activity. 3. Employ host-based intrusion detection systems (HIDS) to alert on unauthorized file system access or attempts to read sensitive files. 4. Implement network segmentation to isolate industrial control systems from general IT networks, limiting the attack surface. 5. Use multi-factor authentication (MFA) for administrative access where possible to reduce the risk of credential compromise. 6. Regularly back up configuration and credential data securely to enable recovery in case of compromise. 7. Engage with AutomationDirect for firmware updates or patches and apply them promptly once available. 8. Educate staff on the risks of credential exposure and enforce strong password management practices. 9. Consider deploying endpoint protection solutions tailored for OT environments that can detect anomalous behavior related to credential theft.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-09-16T20:09:26.633Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d319714a1305fb85d6f649

Added to database: 9/23/2025, 10:04:33 PM

Last enriched: 10/1/2025, 12:46:56 AM

Last updated: 11/9/2025, 5:12:18 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats