CVE-2025-67652: CWE-261 in AutomationDirect CLICK Programmable Logic Controller
CVE-2025-67652 is a medium severity vulnerability affecting AutomationDirect CLICK Programmable Logic Controllers (PLCs), specifically versions C0-0x, C0-1x, and C2-x. The vulnerability arises from improper handling of credentials within project files, allowing an attacker with access to these files to impersonate users, escalate privileges, or gain unauthorized access to connected systems. Exploitation requires local access to the project file and low complexity attack conditions, with no user interaction needed. The vulnerability impacts confidentiality significantly but has limited effect on integrity and no impact on availability. No public exploits are currently known. European organizations using these PLCs in industrial control environments could face risks of unauthorized access and potential lateral movement within their networks. Mitigation requires strict access controls on project files, encryption of sensitive data, and monitoring for unauthorized access. Countries with significant industrial automation sectors and AutomationDirect market presence, such as Germany, France, Italy, and the UK, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2025-67652 is a vulnerability classified under CWE-261 (Incorrect Pointer Scaling) affecting AutomationDirect CLICK Programmable Logic Controllers (PLCs) in versions C0-0x, C0-1x, and C2-x. The core issue stems from insecure handling of credentials embedded within project files used to configure these PLCs. Specifically, the project files expose credentials without robust encryption or secure storage mechanisms, making them susceptible to unauthorized access if an attacker obtains the project file. An attacker with access to these files can impersonate legitimate users, escalate privileges, and gain unauthorized access to systems and services controlled by the PLCs. The vulnerability requires local access to the project file, which may be obtained through insider threats, compromised workstations, or inadequate file access controls. The CVSS v3.1 score is 6.1 (medium severity), reflecting that the attack vector is local (AV:L), attack complexity is low (AC:L), privileges required are low (PR:L), and no user interaction is needed (UI:N). The impact on confidentiality is high (C:H), while integrity impact is low (I:L), and availability is unaffected (A:N). No patches or public exploits are currently available, indicating that mitigation relies on operational security measures. This vulnerability poses a significant risk in industrial environments where PLCs are critical for automation and control, as unauthorized access could lead to data leakage and potential manipulation of control logic if combined with other vulnerabilities or attack vectors.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors relying on AutomationDirect CLICK PLCs, this vulnerability presents a risk of unauthorized access to sensitive control systems. The exposure of credentials can lead to impersonation of authorized users and privilege escalation, potentially allowing attackers to move laterally within industrial networks. Although the vulnerability does not directly impact system availability or cause immediate operational disruption, the confidentiality breach could facilitate further attacks, including sabotage or espionage. Given the increasing integration of industrial control systems with corporate IT networks in Europe, exploitation could compromise both operational technology (OT) and information technology (IT) environments. The impact is particularly relevant for organizations with insufficient access controls on project files or inadequate network segmentation between IT and OT. The absence of robust encryption in project files increases the risk of credential theft if files are improperly stored or transmitted. This vulnerability could also affect supply chain security if project files are shared externally without adequate protection.
Mitigation Recommendations
European organizations should implement strict access controls and permissions on project files associated with AutomationDirect CLICK PLCs, ensuring only authorized personnel can access or modify them. Encrypting project files at rest and in transit is critical to prevent unauthorized disclosure of embedded credentials. Organizations should enforce network segmentation between IT and OT environments to limit the exposure of PLC configuration files. Regular audits and monitoring of file access logs can help detect unauthorized attempts to access or copy project files. Employing endpoint security solutions on workstations used to handle PLC project files can reduce the risk of insider threats or malware-based theft. Where possible, organizations should request or develop secure handling procedures from AutomationDirect, including secure storage and transmission of project files. Until patches or updates are available, consider implementing multi-factor authentication and additional verification mechanisms for access to PLC management interfaces. Training staff on the sensitivity of project files and the risks of credential exposure is also recommended. Finally, maintain an incident response plan tailored to OT environments to quickly address any detected compromise.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-67652: CWE-261 in AutomationDirect CLICK Programmable Logic Controller
Description
CVE-2025-67652 is a medium severity vulnerability affecting AutomationDirect CLICK Programmable Logic Controllers (PLCs), specifically versions C0-0x, C0-1x, and C2-x. The vulnerability arises from improper handling of credentials within project files, allowing an attacker with access to these files to impersonate users, escalate privileges, or gain unauthorized access to connected systems. Exploitation requires local access to the project file and low complexity attack conditions, with no user interaction needed. The vulnerability impacts confidentiality significantly but has limited effect on integrity and no impact on availability. No public exploits are currently known. European organizations using these PLCs in industrial control environments could face risks of unauthorized access and potential lateral movement within their networks. Mitigation requires strict access controls on project files, encryption of sensitive data, and monitoring for unauthorized access. Countries with significant industrial automation sectors and AutomationDirect market presence, such as Germany, France, Italy, and the UK, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-67652 is a vulnerability classified under CWE-261 (Incorrect Pointer Scaling) affecting AutomationDirect CLICK Programmable Logic Controllers (PLCs) in versions C0-0x, C0-1x, and C2-x. The core issue stems from insecure handling of credentials embedded within project files used to configure these PLCs. Specifically, the project files expose credentials without robust encryption or secure storage mechanisms, making them susceptible to unauthorized access if an attacker obtains the project file. An attacker with access to these files can impersonate legitimate users, escalate privileges, and gain unauthorized access to systems and services controlled by the PLCs. The vulnerability requires local access to the project file, which may be obtained through insider threats, compromised workstations, or inadequate file access controls. The CVSS v3.1 score is 6.1 (medium severity), reflecting that the attack vector is local (AV:L), attack complexity is low (AC:L), privileges required are low (PR:L), and no user interaction is needed (UI:N). The impact on confidentiality is high (C:H), while integrity impact is low (I:L), and availability is unaffected (A:N). No patches or public exploits are currently available, indicating that mitigation relies on operational security measures. This vulnerability poses a significant risk in industrial environments where PLCs are critical for automation and control, as unauthorized access could lead to data leakage and potential manipulation of control logic if combined with other vulnerabilities or attack vectors.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors relying on AutomationDirect CLICK PLCs, this vulnerability presents a risk of unauthorized access to sensitive control systems. The exposure of credentials can lead to impersonation of authorized users and privilege escalation, potentially allowing attackers to move laterally within industrial networks. Although the vulnerability does not directly impact system availability or cause immediate operational disruption, the confidentiality breach could facilitate further attacks, including sabotage or espionage. Given the increasing integration of industrial control systems with corporate IT networks in Europe, exploitation could compromise both operational technology (OT) and information technology (IT) environments. The impact is particularly relevant for organizations with insufficient access controls on project files or inadequate network segmentation between IT and OT. The absence of robust encryption in project files increases the risk of credential theft if files are improperly stored or transmitted. This vulnerability could also affect supply chain security if project files are shared externally without adequate protection.
Mitigation Recommendations
European organizations should implement strict access controls and permissions on project files associated with AutomationDirect CLICK PLCs, ensuring only authorized personnel can access or modify them. Encrypting project files at rest and in transit is critical to prevent unauthorized disclosure of embedded credentials. Organizations should enforce network segmentation between IT and OT environments to limit the exposure of PLC configuration files. Regular audits and monitoring of file access logs can help detect unauthorized attempts to access or copy project files. Employing endpoint security solutions on workstations used to handle PLC project files can reduce the risk of insider threats or malware-based theft. Where possible, organizations should request or develop secure handling procedures from AutomationDirect, including secure storage and transmission of project files. Until patches or updates are available, consider implementing multi-factor authentication and additional verification mechanisms for access to PLC management interfaces. Training staff on the sensitivity of project files and the risks of credential exposure is also recommended. Finally, maintain an incident response plan tailored to OT environments to quickly address any detected compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2025-12-09T20:15:49.604Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6972a64c4623b1157c93e397
Added to database: 1/22/2026, 10:35:56 PM
Last enriched: 1/30/2026, 10:00:37 AM
Last updated: 2/7/2026, 3:58:46 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.