CVE-2025-57882: CWE-404 Improper Resource Shutdown or Release in AutomationDirect CLICK PLUS C0-0x CPU firmware
An improper resource shutdown or release vulnerability has been identified in the Click Plus C2-03CPU-2 device running firmware version 3.60. The vulnerability allows an unauthenticated attacker to perform a denial-of-service attack by exhausting all available device sessions in the Remote PLC application.
AI Analysis
Technical Summary
CVE-2025-57882 is a high-severity vulnerability identified in the firmware of AutomationDirect's CLICK PLUS C0-0x CPU series, specifically affecting the Click Plus C2-03CPU-2 device running firmware version 3.60. The vulnerability is classified under CWE-404, which pertains to improper resource shutdown or release. In this case, the flaw allows an unauthenticated attacker to exploit the Remote PLC application by exhausting all available device sessions. This exhaustion leads to a denial-of-service (DoS) condition, effectively rendering the device unresponsive or unable to process legitimate requests. The vulnerability does not require any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score of 8.2 reflects a high severity, with an attack vector of network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability directly, but a high impact on availability (VA:H). The lack of known exploits in the wild suggests it is a recently disclosed issue, but the potential for disruption in industrial control systems (ICS) environments is significant. The improper resource release likely stems from the firmware failing to correctly close or free session resources, allowing an attacker to open multiple sessions until the device's capacity is exhausted. This vulnerability is particularly critical in ICS contexts where uptime and reliability are paramount, as the affected devices are used for automation and control in industrial environments.
Potential Impact
For European organizations, especially those operating in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant risk. The affected AutomationDirect CLICK PLUS C0-0x CPU devices are commonly deployed in programmable logic controller (PLC) roles, which are integral to process control and automation. A successful DoS attack could halt production lines, disrupt supply chains, or impair critical infrastructure operations such as water treatment, energy distribution, or transportation systems. The unauthenticated nature of the attack vector means that attackers can exploit this vulnerability remotely without needing credentials, increasing the risk of widespread disruption. Given the high attack complexity, exploitation may require some specialized knowledge or conditions, but once exploited, the impact on availability is severe. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not mitigate the operational disruption risk. European organizations with interconnected ICS environments or remote management capabilities are particularly vulnerable, as attackers could leverage network access to launch DoS attacks, potentially causing cascading failures in industrial processes.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Immediate firmware update: Although no patch links are currently provided, organizations should monitor AutomationDirect's official channels for firmware updates addressing CVE-2025-57882 and apply them promptly. 2) Network segmentation: Isolate PLC devices from general enterprise networks and restrict access to the Remote PLC application to trusted management networks only. 3) Access control: Implement strict firewall rules and intrusion prevention systems (IPS) to limit incoming connections to the affected devices, reducing exposure to unauthenticated attackers. 4) Session monitoring: Deploy monitoring tools to detect abnormal session counts or connection attempts to the PLC devices, enabling early detection of potential DoS attempts. 5) Rate limiting: Where possible, configure network devices or the PLC itself to limit the number of concurrent sessions or connection attempts from a single source. 6) Incident response planning: Prepare and test response procedures for DoS scenarios affecting ICS devices to minimize downtime and operational impact. 7) Vendor engagement: Engage with AutomationDirect support for guidance and to obtain early access to patches or workarounds. These measures go beyond generic advice by focusing on network-level controls, monitoring, and operational preparedness specific to ICS environments.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Czech Republic
CVE-2025-57882: CWE-404 Improper Resource Shutdown or Release in AutomationDirect CLICK PLUS C0-0x CPU firmware
Description
An improper resource shutdown or release vulnerability has been identified in the Click Plus C2-03CPU-2 device running firmware version 3.60. The vulnerability allows an unauthenticated attacker to perform a denial-of-service attack by exhausting all available device sessions in the Remote PLC application.
AI-Powered Analysis
Technical Analysis
CVE-2025-57882 is a high-severity vulnerability identified in the firmware of AutomationDirect's CLICK PLUS C0-0x CPU series, specifically affecting the Click Plus C2-03CPU-2 device running firmware version 3.60. The vulnerability is classified under CWE-404, which pertains to improper resource shutdown or release. In this case, the flaw allows an unauthenticated attacker to exploit the Remote PLC application by exhausting all available device sessions. This exhaustion leads to a denial-of-service (DoS) condition, effectively rendering the device unresponsive or unable to process legitimate requests. The vulnerability does not require any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score of 8.2 reflects a high severity, with an attack vector of network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability directly, but a high impact on availability (VA:H). The lack of known exploits in the wild suggests it is a recently disclosed issue, but the potential for disruption in industrial control systems (ICS) environments is significant. The improper resource release likely stems from the firmware failing to correctly close or free session resources, allowing an attacker to open multiple sessions until the device's capacity is exhausted. This vulnerability is particularly critical in ICS contexts where uptime and reliability are paramount, as the affected devices are used for automation and control in industrial environments.
Potential Impact
For European organizations, especially those operating in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant risk. The affected AutomationDirect CLICK PLUS C0-0x CPU devices are commonly deployed in programmable logic controller (PLC) roles, which are integral to process control and automation. A successful DoS attack could halt production lines, disrupt supply chains, or impair critical infrastructure operations such as water treatment, energy distribution, or transportation systems. The unauthenticated nature of the attack vector means that attackers can exploit this vulnerability remotely without needing credentials, increasing the risk of widespread disruption. Given the high attack complexity, exploitation may require some specialized knowledge or conditions, but once exploited, the impact on availability is severe. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not mitigate the operational disruption risk. European organizations with interconnected ICS environments or remote management capabilities are particularly vulnerable, as attackers could leverage network access to launch DoS attacks, potentially causing cascading failures in industrial processes.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Immediate firmware update: Although no patch links are currently provided, organizations should monitor AutomationDirect's official channels for firmware updates addressing CVE-2025-57882 and apply them promptly. 2) Network segmentation: Isolate PLC devices from general enterprise networks and restrict access to the Remote PLC application to trusted management networks only. 3) Access control: Implement strict firewall rules and intrusion prevention systems (IPS) to limit incoming connections to the affected devices, reducing exposure to unauthenticated attackers. 4) Session monitoring: Deploy monitoring tools to detect abnormal session counts or connection attempts to the PLC devices, enabling early detection of potential DoS attempts. 5) Rate limiting: Where possible, configure network devices or the PLC itself to limit the number of concurrent sessions or connection attempts from a single source. 6) Incident response planning: Prepare and test response procedures for DoS scenarios affecting ICS devices to minimize downtime and operational impact. 7) Vendor engagement: Engage with AutomationDirect support for guidance and to obtain early access to patches or workarounds. These measures go beyond generic advice by focusing on network-level controls, monitoring, and operational preparedness specific to ICS environments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- icscert
- Date Reserved
- 2025-09-16T20:09:26.673Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d32020e9e7eb6a1ad1b627
Added to database: 9/23/2025, 10:33:04 PM
Last enriched: 10/1/2025, 12:47:48 AM
Last updated: 11/8/2025, 8:28:19 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-3750: Improper Locking in Red Hat Red Hat Enterprise Linux 9
MediumCVE-2025-12621: CWE-863 Incorrect Authorization in wpdesk Flexible Refund and Return Order for WooCommerce
MediumCVE-2024-4693: Operation on a Resource after Expiration or Release
MediumCVE-2024-4418: Use After Free
MediumCVE-2024-2182: Origin Validation Error
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.