CVE-2025-58473: CWE-404 Improper Resource Shutdown or Release in AutomationDirect CLICK PLUS C0-0x CPU firmware
An improper resource shutdown or release vulnerability has been identified in the Click Plus C2-03CPU-2 device running firmware version 3.60. The vulnerability allows an unauthenticated attacker to perform a denial-of-service attack by exhausting all available device sessions of the Click Programming Software.
AI Analysis
Technical Summary
CVE-2025-58473 is a high-severity vulnerability classified under CWE-404 (Improper Resource Shutdown or Release) affecting the AutomationDirect CLICK PLUS C0-0x CPU firmware, specifically version 3.60. The vulnerability arises from improper handling of device sessions within the Click Programming Software interface, which manages connections to the programmable logic controller (PLC) device. An unauthenticated attacker can exploit this flaw remotely over the network to exhaust all available device sessions by repeatedly opening connections without proper release or shutdown of resources. This leads to a denial-of-service (DoS) condition, rendering the device unresponsive to legitimate programming or control commands. The vulnerability does not require any authentication or user interaction, but it does have a high attack complexity, indicating some non-trivial conditions must be met to successfully exploit it. The CVSS 4.0 base score is 8.2, reflecting a high impact on availability (VA:H) with no impact on confidentiality or integrity. The scope is unchanged, and no privileges or user interaction are required. The vulnerability affects industrial control systems (ICS), specifically PLCs used in automation environments, which are critical for operational technology (OT) infrastructure. No known exploits are currently reported in the wild, and no patches have been released yet. Given the nature of the device and the vulnerability, attackers could disrupt industrial processes by denying legitimate access to the PLC, potentially halting production lines or critical infrastructure operations relying on these controllers.
Potential Impact
For European organizations, especially those in manufacturing, utilities, and critical infrastructure sectors, this vulnerability poses a significant risk. AutomationDirect CLICK PLUS PLCs are used in various industrial automation scenarios, including factory automation, building management, and process control. A successful DoS attack could interrupt production workflows, cause operational downtime, and lead to financial losses. In safety-critical environments such as energy grids or water treatment plants, disruption of PLC availability could have cascading effects on public safety and service continuity. Since the vulnerability can be exploited without authentication, attackers from outside the organization or insider threats could trigger the DoS remotely. This elevates the risk profile for European industrial operators who rely on these devices. Additionally, the lack of patches means organizations must rely on mitigation strategies until a firmware update is available. The impact is heightened in countries with a strong industrial base and extensive use of AutomationDirect products in OT environments.
Mitigation Recommendations
1. Network Segmentation: Isolate PLC devices and their programming interfaces within dedicated OT network segments, separated from corporate IT networks and the internet by firewalls and access control lists (ACLs). 2. Access Control: Restrict access to the Click Programming Software interface to authorized personnel only, using VPNs or jump hosts with strong authentication mechanisms. 3. Monitoring and Rate Limiting: Implement network monitoring to detect unusual connection patterns indicative of session exhaustion attempts. Deploy rate limiting on the PLC communication ports to prevent rapid session creation. 4. Incident Response Preparedness: Develop and test response plans for PLC DoS scenarios to quickly restore device availability. 5. Vendor Coordination: Engage with AutomationDirect for timely firmware updates or patches addressing this vulnerability. 6. Physical Security: Ensure physical access to PLC devices is controlled to prevent local exploitation attempts. 7. Alternative Programming Methods: Where possible, use offline programming or scheduled maintenance windows to reduce exposure during critical operations. These measures go beyond generic advice by focusing on network architecture, access restrictions, and operational procedures tailored to the specific vulnerability and device context.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Poland, Belgium, Sweden, Czech Republic
CVE-2025-58473: CWE-404 Improper Resource Shutdown or Release in AutomationDirect CLICK PLUS C0-0x CPU firmware
Description
An improper resource shutdown or release vulnerability has been identified in the Click Plus C2-03CPU-2 device running firmware version 3.60. The vulnerability allows an unauthenticated attacker to perform a denial-of-service attack by exhausting all available device sessions of the Click Programming Software.
AI-Powered Analysis
Technical Analysis
CVE-2025-58473 is a high-severity vulnerability classified under CWE-404 (Improper Resource Shutdown or Release) affecting the AutomationDirect CLICK PLUS C0-0x CPU firmware, specifically version 3.60. The vulnerability arises from improper handling of device sessions within the Click Programming Software interface, which manages connections to the programmable logic controller (PLC) device. An unauthenticated attacker can exploit this flaw remotely over the network to exhaust all available device sessions by repeatedly opening connections without proper release or shutdown of resources. This leads to a denial-of-service (DoS) condition, rendering the device unresponsive to legitimate programming or control commands. The vulnerability does not require any authentication or user interaction, but it does have a high attack complexity, indicating some non-trivial conditions must be met to successfully exploit it. The CVSS 4.0 base score is 8.2, reflecting a high impact on availability (VA:H) with no impact on confidentiality or integrity. The scope is unchanged, and no privileges or user interaction are required. The vulnerability affects industrial control systems (ICS), specifically PLCs used in automation environments, which are critical for operational technology (OT) infrastructure. No known exploits are currently reported in the wild, and no patches have been released yet. Given the nature of the device and the vulnerability, attackers could disrupt industrial processes by denying legitimate access to the PLC, potentially halting production lines or critical infrastructure operations relying on these controllers.
Potential Impact
For European organizations, especially those in manufacturing, utilities, and critical infrastructure sectors, this vulnerability poses a significant risk. AutomationDirect CLICK PLUS PLCs are used in various industrial automation scenarios, including factory automation, building management, and process control. A successful DoS attack could interrupt production workflows, cause operational downtime, and lead to financial losses. In safety-critical environments such as energy grids or water treatment plants, disruption of PLC availability could have cascading effects on public safety and service continuity. Since the vulnerability can be exploited without authentication, attackers from outside the organization or insider threats could trigger the DoS remotely. This elevates the risk profile for European industrial operators who rely on these devices. Additionally, the lack of patches means organizations must rely on mitigation strategies until a firmware update is available. The impact is heightened in countries with a strong industrial base and extensive use of AutomationDirect products in OT environments.
Mitigation Recommendations
1. Network Segmentation: Isolate PLC devices and their programming interfaces within dedicated OT network segments, separated from corporate IT networks and the internet by firewalls and access control lists (ACLs). 2. Access Control: Restrict access to the Click Programming Software interface to authorized personnel only, using VPNs or jump hosts with strong authentication mechanisms. 3. Monitoring and Rate Limiting: Implement network monitoring to detect unusual connection patterns indicative of session exhaustion attempts. Deploy rate limiting on the PLC communication ports to prevent rapid session creation. 4. Incident Response Preparedness: Develop and test response plans for PLC DoS scenarios to quickly restore device availability. 5. Vendor Coordination: Engage with AutomationDirect for timely firmware updates or patches addressing this vulnerability. 6. Physical Security: Ensure physical access to PLC devices is controlled to prevent local exploitation attempts. 7. Alternative Programming Methods: Where possible, use offline programming or scheduled maintenance windows to reduce exposure during critical operations. These measures go beyond generic advice by focusing on network architecture, access restrictions, and operational procedures tailored to the specific vulnerability and device context.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- icscert
- Date Reserved
- 2025-09-16T20:09:26.651Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d336ac712f26b964ce8e52
Added to database: 9/24/2025, 12:09:16 AM
Last enriched: 10/1/2025, 12:48:29 AM
Last updated: 10/7/2025, 1:41:05 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.