Automation Direct CLICK PLC CPU Modules
AutomationDirect CLICK PLC CPU modules with firmware prior to v3.00 contain vulnerabilities in authentication and credential protection. Weak authentication mechanisms (CWE-288) and unencrypted password storage and transmission (CWE-319, CWE-256) allow attackers to obtain valid user credentials or bypass authentication to access the PLC programming interface. Successful exploitation could allow an attacker to log in as a currently or previously authenticated user or discover passwords for valid users, enabling unauthorized PLC modification or operation control.
- Network access to the CLICK PLC CPU module port
- The PLC module is running firmware prior to v3.00
- No network segmentation isolating the PLC from attacker-reachable networks
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d70f2f31-7247-41ff-b48a-2301a6cbe215Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.