Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55038: CWE-862 Missing Authorization in AutomationDirect CLICK PLUS C0-0x CPU firmware

0
High
VulnerabilityCVE-2025-55038cvecve-2025-55038cwe-862
Published: Tue Sep 23 2025 (09/23/2025, 22:24:28 UTC)
Source: CVE Database V5
Vendor/Project: AutomationDirect
Product: CLICK PLUS C0-0x CPU firmware

Description

An authorization bypass vulnerability has been discovered in the Click Plus C2-03CPU2 device firmware version 3.60. Through the KOPR protocol utilized by the Remote PLC application, authenticated users with low-level access permissions can exploit this vulnerability to read and modify PLC variables beyond their intended authorization level.

AI-Powered Analysis

AILast updated: 10/01/2025, 00:47:10 UTC

Technical Analysis

CVE-2025-55038 is an authorization bypass vulnerability identified in the firmware version 3.60 of the AutomationDirect CLICK PLUS C0-0x CPU series, specifically affecting the Click Plus C2-03CPU2 device. The vulnerability arises from improper enforcement of authorization controls within the KOPR protocol, which is used by the Remote PLC application to communicate with the programmable logic controller (PLC). Authenticated users with low-level access permissions can exploit this flaw to read and modify PLC variables that should be restricted, effectively elevating their privileges beyond intended limits. This vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to properly verify whether a user is authorized to perform certain actions. The CVSS v4.0 base score is 7.6 (high severity), reflecting the network attack vector (AV:N), high attack complexity (AC:H), no privileges required beyond low-level access (PR:L), no user interaction (UI:N), and high impact on confidentiality and integrity (VC:H, VI:H), with no impact on availability. The scope remains unchanged (S:U). No known exploits are currently reported in the wild, and no patches have been released yet. This vulnerability could allow an attacker with limited access to manipulate industrial control processes by altering PLC variables, potentially leading to unsafe operational states or data leakage within industrial environments.

Potential Impact

For European organizations, particularly those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant risk. Exploitation could lead to unauthorized manipulation of industrial processes, causing operational disruptions, safety hazards, and potential physical damage to equipment. Confidentiality breaches could expose sensitive operational data, intellectual property, or process parameters. The ability to modify PLC variables without proper authorization undermines the integrity of control systems, potentially leading to incorrect process execution or unsafe conditions. Given the widespread use of AutomationDirect CLICK PLUS PLCs in European manufacturing and automation sectors, exploitation could impact production lines, utilities, and infrastructure management. Additionally, the high attack complexity somewhat limits exploitation to skilled attackers with network access and some level of authentication, but the lack of required user interaction facilitates remote exploitation once initial access is obtained. The absence of patches increases the urgency for organizations to implement compensating controls to mitigate risk.

Mitigation Recommendations

1. Implement strict network segmentation to isolate PLC devices and the Remote PLC application from general IT networks and untrusted sources. 2. Enforce strong access controls and multi-factor authentication for all users accessing the Remote PLC application to reduce the risk of unauthorized low-level access. 3. Monitor and log all access to PLC devices, focusing on anomalous read/write operations to detect potential exploitation attempts. 4. Restrict the use of the KOPR protocol to trusted hosts and networks only, using firewall rules and network access control lists. 5. Employ intrusion detection/prevention systems tailored for industrial control systems to identify suspicious activities targeting PLCs. 6. Coordinate with AutomationDirect for timely firmware updates and patches; until patches are available, consider temporary operational restrictions or compensating controls. 7. Conduct regular security assessments and penetration testing focused on industrial control systems to identify and remediate similar authorization weaknesses. 8. Train operational technology (OT) personnel on the risks of privilege escalation and the importance of adhering to security policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-09-16T20:09:26.660Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d32020e9e7eb6a1ad1b623

Added to database: 9/23/2025, 10:33:04 PM

Last enriched: 10/1/2025, 12:47:10 AM

Last updated: 11/10/2025, 7:42:00 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats