CVE-2025-59484: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in AutomationDirect CLICK PLUS C0-0x CPU firmware
The use of a broken or risky cryptographic algorithm was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software uses an insecure implementation of the RSA encryption algorithm.
AI Analysis
Technical Summary
CVE-2025-59484 identifies a high-severity vulnerability in the firmware version 3.60 of AutomationDirect's CLICK PLUS C0-0x CPU programmable logic controllers (PLCs). The core issue is the use of a broken or risky cryptographic algorithm, specifically an insecure implementation of the RSA encryption algorithm, classified under CWE-327. RSA is widely used for securing communications and ensuring data integrity, but improper implementation can lead to vulnerabilities such as weak key generation, predictable randomness, or flawed padding schemes, which attackers can exploit to decrypt sensitive data or impersonate legitimate devices. This vulnerability does not require privileges or authentication to exploit (AV:N/PR:N), but it does require user interaction (UI:P), such as sending crafted data to the device. The impact on confidentiality and integrity is high, with limited availability impact. The vulnerability affects the firmware of industrial control systems (ICS), which are critical for automation in manufacturing, utilities, and infrastructure. Although no known exploits are currently in the wild, the high CVSS score (8.7) and the nature of the vulnerability indicate a significant risk if exploited, potentially allowing attackers to intercept or manipulate control commands, leading to operational disruptions or safety hazards.
Potential Impact
For European organizations, especially those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive operational data or manipulation of control logic, resulting in production downtime, safety incidents, or damage to physical assets. Given the reliance on AutomationDirect's CLICK PLUS PLCs in various European industries, attackers could leverage this flaw to compromise industrial processes. The high confidentiality and integrity impact could also affect compliance with European data protection regulations, such as GDPR, if sensitive operational data is exposed. Moreover, disruption in critical infrastructure could have cascading effects on supply chains and public safety. The requirement for user interaction suggests targeted attacks, possibly via phishing or social engineering to induce operators to interact with malicious inputs, increasing the threat to organizations with less mature cybersecurity awareness.
Mitigation Recommendations
Organizations should prioritize updating the firmware of CLICK PLUS C0-0x CPU devices to a patched version once available from AutomationDirect. In the absence of a patch, network segmentation should be enforced to isolate PLCs from general IT networks and restrict access to trusted personnel only. Implement strict input validation and monitoring for anomalous commands or traffic patterns targeting these devices. Employ multi-factor authentication and robust access controls on systems interfacing with the PLCs to reduce the risk of unauthorized interactions. Additionally, conduct employee training focused on recognizing social engineering attempts that could trigger the required user interaction for exploitation. Regularly audit and update cryptographic policies to ensure only secure algorithms and implementations are used in industrial environments. Finally, collaborate with ICS cybersecurity specialists to perform penetration testing and vulnerability assessments tailored to these PLCs.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Czech Republic
CVE-2025-59484: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in AutomationDirect CLICK PLUS C0-0x CPU firmware
Description
The use of a broken or risky cryptographic algorithm was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software uses an insecure implementation of the RSA encryption algorithm.
AI-Powered Analysis
Technical Analysis
CVE-2025-59484 identifies a high-severity vulnerability in the firmware version 3.60 of AutomationDirect's CLICK PLUS C0-0x CPU programmable logic controllers (PLCs). The core issue is the use of a broken or risky cryptographic algorithm, specifically an insecure implementation of the RSA encryption algorithm, classified under CWE-327. RSA is widely used for securing communications and ensuring data integrity, but improper implementation can lead to vulnerabilities such as weak key generation, predictable randomness, or flawed padding schemes, which attackers can exploit to decrypt sensitive data or impersonate legitimate devices. This vulnerability does not require privileges or authentication to exploit (AV:N/PR:N), but it does require user interaction (UI:P), such as sending crafted data to the device. The impact on confidentiality and integrity is high, with limited availability impact. The vulnerability affects the firmware of industrial control systems (ICS), which are critical for automation in manufacturing, utilities, and infrastructure. Although no known exploits are currently in the wild, the high CVSS score (8.7) and the nature of the vulnerability indicate a significant risk if exploited, potentially allowing attackers to intercept or manipulate control commands, leading to operational disruptions or safety hazards.
Potential Impact
For European organizations, especially those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive operational data or manipulation of control logic, resulting in production downtime, safety incidents, or damage to physical assets. Given the reliance on AutomationDirect's CLICK PLUS PLCs in various European industries, attackers could leverage this flaw to compromise industrial processes. The high confidentiality and integrity impact could also affect compliance with European data protection regulations, such as GDPR, if sensitive operational data is exposed. Moreover, disruption in critical infrastructure could have cascading effects on supply chains and public safety. The requirement for user interaction suggests targeted attacks, possibly via phishing or social engineering to induce operators to interact with malicious inputs, increasing the threat to organizations with less mature cybersecurity awareness.
Mitigation Recommendations
Organizations should prioritize updating the firmware of CLICK PLUS C0-0x CPU devices to a patched version once available from AutomationDirect. In the absence of a patch, network segmentation should be enforced to isolate PLCs from general IT networks and restrict access to trusted personnel only. Implement strict input validation and monitoring for anomalous commands or traffic patterns targeting these devices. Employ multi-factor authentication and robust access controls on systems interfacing with the PLCs to reduce the risk of unauthorized interactions. Additionally, conduct employee training focused on recognizing social engineering attempts that could trigger the required user interaction for exploitation. Regularly audit and update cryptographic policies to ensure only secure algorithms and implementations are used in industrial environments. Finally, collaborate with ICS cybersecurity specialists to perform penetration testing and vulnerability assessments tailored to these PLCs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- icscert
- Date Reserved
- 2025-09-16T20:09:26.619Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d31b57770bf6e4769153cf
Added to database: 9/23/2025, 10:12:39 PM
Last enriched: 10/1/2025, 12:48:44 AM
Last updated: 11/9/2025, 8:27:10 PM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12918: Improper Control of Resource Identifiers in yungifez Skuul School Management System
LowCVE-2025-12917: Denial of Service in TOZED ZLT T10
MediumCVE-2025-12916: Command Injection in Sangfor Operation and Maintenance Security Management System
MediumCVE-2025-12915: File Inclusion in 70mai X200
HighCVE-2025-12914: SQL Injection in aaPanel BaoTa
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.