Skip to main content

CVE-2025-59484: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in AutomationDirect CLICK PLUS C0-0x CPU firmware

High
VulnerabilityCVE-2025-59484cvecve-2025-59484cwe-327
Published: Tue Sep 23 2025 (09/23/2025, 22:08:40 UTC)
Source: CVE Database V5
Vendor/Project: AutomationDirect
Product: CLICK PLUS C0-0x CPU firmware

Description

The use of a broken or risky cryptographic algorithm was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software uses an insecure implementation of the RSA encryption algorithm.

AI-Powered Analysis

AILast updated: 09/23/2025, 22:12:55 UTC

Technical Analysis

CVE-2025-59484 identifies a high-severity vulnerability in the firmware version 3.60 of AutomationDirect's CLICK PLUS C0-0x CPU, a programmable logic controller (PLC) widely used in industrial automation. The core issue is the use of a broken or risky cryptographic algorithm, specifically an insecure implementation of the RSA encryption algorithm. RSA is a foundational public-key cryptographic method used to secure communications and authenticate devices. However, improper implementation—such as weak key sizes, flawed padding schemes, or poor random number generation—can render RSA vulnerable to cryptanalysis or key recovery attacks. This vulnerability falls under CWE-327, which covers the use of cryptographic algorithms that are either broken or considered risky due to known weaknesses. The CVSS 4.0 base score of 8.7 (high severity) reflects that the vulnerability can be exploited remotely (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:P). The impact on confidentiality and integrity is high, while availability impact is low. Exploiting this flaw could allow attackers to decrypt sensitive data, impersonate legitimate devices, or inject malicious commands into the PLC, potentially disrupting industrial processes or causing unsafe conditions. Although no known exploits are currently in the wild, the vulnerability's presence in critical industrial control system (ICS) firmware makes it a significant risk. The lack of available patches at the time of publication further elevates the urgency for mitigation. Given the central role of PLCs in manufacturing, energy, and infrastructure sectors, this vulnerability poses a substantial threat to operational technology (OT) environments.

Potential Impact

For European organizations, particularly those operating in manufacturing, energy production, utilities, and critical infrastructure, this vulnerability could have severe consequences. Exploitation could lead to unauthorized access to control systems, manipulation of industrial processes, and potential physical damage or safety hazards. Confidentiality breaches may expose proprietary process data or operational parameters, while integrity compromises could result in altered control commands causing process disruptions or equipment damage. The high severity and ease of exploitation mean attackers could remotely compromise systems without authentication, increasing the risk of widespread impact. Disruptions in industrial operations could lead to financial losses, regulatory penalties, and reputational damage. Additionally, given Europe's emphasis on cybersecurity in critical infrastructure under frameworks like NIS2, failure to address this vulnerability could have compliance implications. The absence of known exploits currently provides a window for proactive defense, but the risk of future exploitation remains significant.

Mitigation Recommendations

1. Immediate firmware update: Organizations should monitor AutomationDirect's advisories closely and apply firmware updates or patches as soon as they become available. 2. Network segmentation: Isolate PLCs and other ICS devices from general IT networks and restrict access to trusted management stations only. 3. Implement strict access controls: Use firewalls and access control lists (ACLs) to limit network traffic to and from PLCs, allowing only necessary protocols and IP addresses. 4. Employ cryptographic compensating controls: Where possible, implement additional encryption layers or VPN tunnels to protect communications involving the vulnerable PLCs. 5. Monitor network traffic: Deploy intrusion detection/prevention systems (IDS/IPS) tailored for ICS environments to detect anomalous activities indicative of exploitation attempts. 6. Conduct regular security assessments: Perform vulnerability scans and penetration tests focused on ICS components to identify and remediate weaknesses. 7. Incident response planning: Prepare and rehearse response procedures specific to ICS compromise scenarios to minimize impact if exploitation occurs. 8. Vendor engagement: Engage with AutomationDirect for detailed technical guidance and timelines for patch releases, and consider alternative hardware if remediation is delayed. These measures go beyond generic advice by focusing on compensating controls and operational security tailored to the unique ICS context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-09-16T20:09:26.619Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d31b57770bf6e4769153cf

Added to database: 9/23/2025, 10:12:39 PM

Last enriched: 9/23/2025, 10:12:55 PM

Last updated: 9/25/2025, 5:08:09 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats