CVE-2025-55038: CWE-862 Missing Authorization in AutomationDirect CLICK PLUS C0-0x CPU firmware
An authorization bypass vulnerability has been discovered in the Click Plus C2-03CPU2 device firmware version 3.60. Through the KOPR protocol utilized by the Remote PLC application, authenticated users with low-level access permissions can exploit this vulnerability to read and modify PLC variables beyond their intended authorization level.
AI Analysis
Technical Summary
CVE-2025-55038 is an authorization bypass vulnerability identified in the firmware version 3.60 of the AutomationDirect CLICK PLUS C0-0x CPU series, specifically affecting the Click Plus C2-03CPU2 device. The vulnerability arises from improper enforcement of authorization controls within the KOPR protocol, which is used by the Remote PLC application to communicate with the programmable logic controller (PLC). Authenticated users who possess only low-level access permissions can exploit this flaw to read and modify PLC variables that should be restricted to higher privilege levels. This effectively allows unauthorized escalation of privileges within the device, compromising the integrity and confidentiality of the industrial control system's operational data. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to properly verify whether a user is authorized to perform certain actions. The CVSS v4.0 base score is 7.6 (high severity), reflecting the network attack vector (no physical access needed), the requirement for low-level privileges, and the significant impact on confidentiality and integrity of the system. No user interaction or authentication bypass is required beyond the low-level authenticated access. Although no known exploits are currently observed in the wild, the vulnerability poses a substantial risk to industrial environments relying on these PLCs for automation control. The lack of available patches at the time of publication further increases the urgency for mitigation.
Potential Impact
For European organizations, especially those operating in industrial automation, manufacturing, utilities, and critical infrastructure sectors, this vulnerability presents a serious risk. Exploitation could lead to unauthorized manipulation of PLC variables, potentially causing operational disruptions, safety hazards, and production downtime. The integrity of automated processes could be compromised, leading to incorrect system behavior or damage to physical equipment. Confidentiality breaches could expose sensitive operational data, which may be leveraged for further attacks or industrial espionage. Given the widespread use of AutomationDirect CLICK PLUS PLCs in European industrial environments, organizations could face significant operational and financial impacts. Additionally, regulatory compliance requirements such as the NIS Directive and GDPR may be implicated if the vulnerability leads to data breaches or service disruptions. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the need for immediate attention.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Immediately review and restrict user access permissions to the minimum necessary level, ensuring that only trusted personnel have low-level authenticated access to the Remote PLC application. 2) Monitor network traffic for unusual or unauthorized KOPR protocol communications, employing anomaly detection tools tailored for industrial control system protocols. 3) Segment the network to isolate PLC devices from broader enterprise networks, limiting exposure to potentially compromised user accounts. 4) Implement strict logging and auditing of all PLC access and variable modifications to detect unauthorized activities promptly. 5) Engage with AutomationDirect for firmware updates or patches as they become available, and plan for rapid deployment once released. 6) Conduct security awareness training focused on the risks of unauthorized access within industrial control environments. 7) Consider deploying additional access control mechanisms such as multi-factor authentication for Remote PLC application access, if supported. These steps go beyond generic advice by focusing on access control tightening, network segmentation, and active monitoring specific to the affected devices and protocols.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Czech Republic
CVE-2025-55038: CWE-862 Missing Authorization in AutomationDirect CLICK PLUS C0-0x CPU firmware
Description
An authorization bypass vulnerability has been discovered in the Click Plus C2-03CPU2 device firmware version 3.60. Through the KOPR protocol utilized by the Remote PLC application, authenticated users with low-level access permissions can exploit this vulnerability to read and modify PLC variables beyond their intended authorization level.
AI-Powered Analysis
Technical Analysis
CVE-2025-55038 is an authorization bypass vulnerability identified in the firmware version 3.60 of the AutomationDirect CLICK PLUS C0-0x CPU series, specifically affecting the Click Plus C2-03CPU2 device. The vulnerability arises from improper enforcement of authorization controls within the KOPR protocol, which is used by the Remote PLC application to communicate with the programmable logic controller (PLC). Authenticated users who possess only low-level access permissions can exploit this flaw to read and modify PLC variables that should be restricted to higher privilege levels. This effectively allows unauthorized escalation of privileges within the device, compromising the integrity and confidentiality of the industrial control system's operational data. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to properly verify whether a user is authorized to perform certain actions. The CVSS v4.0 base score is 7.6 (high severity), reflecting the network attack vector (no physical access needed), the requirement for low-level privileges, and the significant impact on confidentiality and integrity of the system. No user interaction or authentication bypass is required beyond the low-level authenticated access. Although no known exploits are currently observed in the wild, the vulnerability poses a substantial risk to industrial environments relying on these PLCs for automation control. The lack of available patches at the time of publication further increases the urgency for mitigation.
Potential Impact
For European organizations, especially those operating in industrial automation, manufacturing, utilities, and critical infrastructure sectors, this vulnerability presents a serious risk. Exploitation could lead to unauthorized manipulation of PLC variables, potentially causing operational disruptions, safety hazards, and production downtime. The integrity of automated processes could be compromised, leading to incorrect system behavior or damage to physical equipment. Confidentiality breaches could expose sensitive operational data, which may be leveraged for further attacks or industrial espionage. Given the widespread use of AutomationDirect CLICK PLUS PLCs in European industrial environments, organizations could face significant operational and financial impacts. Additionally, regulatory compliance requirements such as the NIS Directive and GDPR may be implicated if the vulnerability leads to data breaches or service disruptions. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the need for immediate attention.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Immediately review and restrict user access permissions to the minimum necessary level, ensuring that only trusted personnel have low-level authenticated access to the Remote PLC application. 2) Monitor network traffic for unusual or unauthorized KOPR protocol communications, employing anomaly detection tools tailored for industrial control system protocols. 3) Segment the network to isolate PLC devices from broader enterprise networks, limiting exposure to potentially compromised user accounts. 4) Implement strict logging and auditing of all PLC access and variable modifications to detect unauthorized activities promptly. 5) Engage with AutomationDirect for firmware updates or patches as they become available, and plan for rapid deployment once released. 6) Conduct security awareness training focused on the risks of unauthorized access within industrial control environments. 7) Consider deploying additional access control mechanisms such as multi-factor authentication for Remote PLC application access, if supported. These steps go beyond generic advice by focusing on access control tightening, network segmentation, and active monitoring specific to the affected devices and protocols.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- icscert
- Date Reserved
- 2025-09-16T20:09:26.660Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d32020e9e7eb6a1ad1b623
Added to database: 9/23/2025, 10:33:04 PM
Last enriched: 9/23/2025, 10:33:33 PM
Last updated: 9/25/2025, 2:23:37 PM
Views: 15
Related Threats
CVE-2025-29156: n/a
HighCVE-2025-29157: n/a
MediumCVE-2025-10962: Command Injection in Wavlink NU516U1
MediumCVE-2025-10961: Command Injection in Wavlink NU516U1
MediumCVE-2025-10960: Command Injection in Wavlink NU516U1
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.