Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57882: CWE-404 Improper Resource Shutdown or Release in AutomationDirect CLICK PLUS C0-0x CPU firmware

0
High
VulnerabilityCVE-2025-57882cvecve-2025-57882cwe-404
Published: Tue Sep 23 2025 (09/23/2025, 22:27:02 UTC)
Source: CVE Database V5
Vendor/Project: AutomationDirect
Product: CLICK PLUS C0-0x CPU firmware

Description

An improper resource shutdown or release vulnerability has been identified in the Click Plus C2-03CPU-2 device running firmware version 3.60. The vulnerability allows an unauthenticated attacker to perform a denial-of-service attack by exhausting all available device sessions in the Remote PLC application.

AI-Powered Analysis

AILast updated: 10/01/2025, 00:47:48 UTC

Technical Analysis

CVE-2025-57882 is a high-severity vulnerability identified in the firmware of AutomationDirect's CLICK PLUS C0-0x CPU series, specifically affecting the Click Plus C2-03CPU-2 device running firmware version 3.60. The vulnerability is classified under CWE-404, which pertains to improper resource shutdown or release. In this case, the flaw allows an unauthenticated attacker to exploit the Remote PLC application by exhausting all available device sessions. This exhaustion leads to a denial-of-service (DoS) condition, effectively rendering the device unresponsive or unable to process legitimate requests. The vulnerability does not require any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score of 8.2 reflects a high severity, with an attack vector of network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability directly, but a high impact on availability (VA:H). The lack of known exploits in the wild suggests it is a recently disclosed issue, but the potential for disruption in industrial control systems (ICS) environments is significant. The improper resource release likely stems from the firmware failing to correctly close or free session resources, allowing an attacker to open multiple sessions until the device's capacity is exhausted. This vulnerability is particularly critical in ICS contexts where uptime and reliability are paramount, as the affected devices are used for automation and control in industrial environments.

Potential Impact

For European organizations, especially those operating in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant risk. The affected AutomationDirect CLICK PLUS C0-0x CPU devices are commonly deployed in programmable logic controller (PLC) roles, which are integral to process control and automation. A successful DoS attack could halt production lines, disrupt supply chains, or impair critical infrastructure operations such as water treatment, energy distribution, or transportation systems. The unauthenticated nature of the attack vector means that attackers can exploit this vulnerability remotely without needing credentials, increasing the risk of widespread disruption. Given the high attack complexity, exploitation may require some specialized knowledge or conditions, but once exploited, the impact on availability is severe. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not mitigate the operational disruption risk. European organizations with interconnected ICS environments or remote management capabilities are particularly vulnerable, as attackers could leverage network access to launch DoS attacks, potentially causing cascading failures in industrial processes.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Immediate firmware update: Although no patch links are currently provided, organizations should monitor AutomationDirect's official channels for firmware updates addressing CVE-2025-57882 and apply them promptly. 2) Network segmentation: Isolate PLC devices from general enterprise networks and restrict access to the Remote PLC application to trusted management networks only. 3) Access control: Implement strict firewall rules and intrusion prevention systems (IPS) to limit incoming connections to the affected devices, reducing exposure to unauthenticated attackers. 4) Session monitoring: Deploy monitoring tools to detect abnormal session counts or connection attempts to the PLC devices, enabling early detection of potential DoS attempts. 5) Rate limiting: Where possible, configure network devices or the PLC itself to limit the number of concurrent sessions or connection attempts from a single source. 6) Incident response planning: Prepare and test response procedures for DoS scenarios affecting ICS devices to minimize downtime and operational impact. 7) Vendor engagement: Engage with AutomationDirect support for guidance and to obtain early access to patches or workarounds. These measures go beyond generic advice by focusing on network-level controls, monitoring, and operational preparedness specific to ICS environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-09-16T20:09:26.673Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d32020e9e7eb6a1ad1b627

Added to database: 9/23/2025, 10:33:04 PM

Last enriched: 10/1/2025, 12:47:48 AM

Last updated: 11/8/2025, 8:28:19 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats