Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58069: CWE-321 Use of Hard-coded Cryptographic Key in AutomationDirect CLICK PLUS C0-0x CPU firmware

0
Medium
VulnerabilityCVE-2025-58069cvecve-2025-58069cwe-321
Published: Tue Sep 23 2025 (09/23/2025, 22:04:58 UTC)
Source: CVE Database V5
Vendor/Project: AutomationDirect
Product: CLICK PLUS C0-0x CPU firmware

Description

The use of a hard-coded cryptographic key was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software contains a hard-coded AES key used to protect the initial messages of a new KOPS session.

AI-Powered Analysis

AILast updated: 10/01/2025, 00:48:02 UTC

Technical Analysis

CVE-2025-58069 identifies a security vulnerability in the firmware version 3.60 of the AutomationDirect CLICK PLUS C0-0x CPU programmable logic controller (PLC). The core issue is the presence of a hard-coded AES cryptographic key embedded within the firmware. This key is used to protect the initial messages exchanged during the establishment of a new KOPS (Key-Operated Protection System) session. The use of a hard-coded key violates cryptographic best practices, as it allows attackers who discover or extract the key to decrypt or forge these initial messages, potentially bypassing authentication or session establishment controls. Since the vulnerability is in the firmware of a PLC, which is a critical component in industrial control systems (ICS), exploitation could lead to unauthorized access or manipulation of industrial processes. The CVSS 4.0 score of 6.9 (medium severity) reflects that the vulnerability is remotely exploitable without authentication or user interaction, with low impact on confidentiality and no impact on integrity or availability as per the vector metrics. No known exploits are currently reported in the wild, and no patches have been released yet. The vulnerability is classified under CWE-321, which covers the use of hard-coded cryptographic keys, a common weakness that undermines cryptographic protections by making keys predictable or extractable. This flaw could be leveraged by attackers to intercept or manipulate communications during the initial KOPS session setup, potentially enabling further attacks on the PLC or the industrial network it controls.

Potential Impact

For European organizations, especially those operating in manufacturing, utilities, or critical infrastructure sectors that rely on AutomationDirect CLICK PLUS PLCs, this vulnerability poses a tangible risk. Exploitation could allow attackers to intercept or manipulate control commands or data exchanges during session initiation, potentially leading to unauthorized control or disruption of industrial processes. While the immediate impact on confidentiality, integrity, and availability is rated low to medium, the broader operational consequences could be significant if attackers leverage this vulnerability as a foothold for more extensive attacks. Given the increasing digitization and interconnectivity of industrial environments in Europe, such vulnerabilities can undermine operational reliability and safety. Additionally, regulatory frameworks like the NIS Directive and the EU Cybersecurity Act emphasize the protection of critical infrastructure, making exploitation of such vulnerabilities a compliance concern. The lack of patches increases the urgency for risk mitigation to prevent potential exploitation, especially in environments where firmware updates are challenging or infrequent.

Mitigation Recommendations

1. Network Segmentation: Isolate PLCs and other ICS devices from general IT networks and restrict access to trusted management stations only. 2. Monitoring and Anomaly Detection: Implement network monitoring solutions tailored for ICS environments to detect unusual traffic patterns or unauthorized attempts to initiate KOPS sessions. 3. Firmware Integrity Checks: Regularly verify firmware integrity using cryptographic hashes to detect unauthorized modifications. 4. Vendor Engagement: Engage with AutomationDirect to obtain timelines for firmware patches or mitigations and request guidance on secure configuration. 5. Access Controls: Enforce strict access controls and authentication mechanisms on devices and management interfaces to reduce the attack surface. 6. Incident Response Planning: Prepare ICS-specific incident response plans that include procedures for handling cryptographic key compromise scenarios. 7. Physical Security: Ensure physical security of PLC devices to prevent direct firmware extraction or tampering. 8. Alternative Cryptographic Measures: Where possible, implement additional encryption or VPN tunnels at the network level to protect communications beyond the vulnerable firmware layer. These steps go beyond generic advice by focusing on compensating controls and operational practices tailored to the ICS context and the specific nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-09-16T20:09:26.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d31b57770bf6e4769153cb

Added to database: 9/23/2025, 10:12:39 PM

Last enriched: 10/1/2025, 12:48:02 AM

Last updated: 11/6/2025, 12:50:08 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats