Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59484: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in AutomationDirect CLICK PLUS C0-0x CPU firmware

0
High
VulnerabilityCVE-2025-59484cvecve-2025-59484cwe-327
Published: Tue Sep 23 2025 (09/23/2025, 22:08:40 UTC)
Source: CVE Database V5
Vendor/Project: AutomationDirect
Product: CLICK PLUS C0-0x CPU firmware

Description

The use of a broken or risky cryptographic algorithm was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software uses an insecure implementation of the RSA encryption algorithm.

AI-Powered Analysis

AILast updated: 10/01/2025, 00:48:44 UTC

Technical Analysis

CVE-2025-59484 identifies a high-severity vulnerability in the firmware version 3.60 of AutomationDirect's CLICK PLUS C0-0x CPU programmable logic controllers (PLCs). The core issue is the use of a broken or risky cryptographic algorithm, specifically an insecure implementation of the RSA encryption algorithm, classified under CWE-327. RSA is widely used for securing communications and ensuring data integrity, but improper implementation can lead to vulnerabilities such as weak key generation, predictable randomness, or flawed padding schemes, which attackers can exploit to decrypt sensitive data or impersonate legitimate devices. This vulnerability does not require privileges or authentication to exploit (AV:N/PR:N), but it does require user interaction (UI:P), such as sending crafted data to the device. The impact on confidentiality and integrity is high, with limited availability impact. The vulnerability affects the firmware of industrial control systems (ICS), which are critical for automation in manufacturing, utilities, and infrastructure. Although no known exploits are currently in the wild, the high CVSS score (8.7) and the nature of the vulnerability indicate a significant risk if exploited, potentially allowing attackers to intercept or manipulate control commands, leading to operational disruptions or safety hazards.

Potential Impact

For European organizations, especially those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive operational data or manipulation of control logic, resulting in production downtime, safety incidents, or damage to physical assets. Given the reliance on AutomationDirect's CLICK PLUS PLCs in various European industries, attackers could leverage this flaw to compromise industrial processes. The high confidentiality and integrity impact could also affect compliance with European data protection regulations, such as GDPR, if sensitive operational data is exposed. Moreover, disruption in critical infrastructure could have cascading effects on supply chains and public safety. The requirement for user interaction suggests targeted attacks, possibly via phishing or social engineering to induce operators to interact with malicious inputs, increasing the threat to organizations with less mature cybersecurity awareness.

Mitigation Recommendations

Organizations should prioritize updating the firmware of CLICK PLUS C0-0x CPU devices to a patched version once available from AutomationDirect. In the absence of a patch, network segmentation should be enforced to isolate PLCs from general IT networks and restrict access to trusted personnel only. Implement strict input validation and monitoring for anomalous commands or traffic patterns targeting these devices. Employ multi-factor authentication and robust access controls on systems interfacing with the PLCs to reduce the risk of unauthorized interactions. Additionally, conduct employee training focused on recognizing social engineering attempts that could trigger the required user interaction for exploitation. Regularly audit and update cryptographic policies to ensure only secure algorithms and implementations are used in industrial environments. Finally, collaborate with ICS cybersecurity specialists to perform penetration testing and vulnerability assessments tailored to these PLCs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-09-16T20:09:26.619Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d31b57770bf6e4769153cf

Added to database: 9/23/2025, 10:12:39 PM

Last enriched: 10/1/2025, 12:48:44 AM

Last updated: 11/9/2025, 8:27:10 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats