AutomationDirect CLICK Programmable Logic Controller
AutomationDirect CLICK Programmable Logic Controller contains vulnerabilities (CWE-261: Improper Handling of Insufficient Permissions or Privileges, CWE-256: Plaintext Storage of Password) that allow an attacker with local access and low privilege level to impersonate users, escalate privileges, gain unauthorized access to systems and services, and decrypt sensitive data. Affects CLICK C0-0x, C0-1x, and C2-x series PLCs. CLICK PLUS firmware update to V3.90 addresses these issues; however, the legacy C0 and C2 series have no patch available from the vendor.
- Local access to the PLC (physical access to a terminal, engineering workstation on the same network segment, or remote access via corporate LAN)
- Low-privilege local user account or ability to log on as an unprivileged user
- Access to a system or interface where the PLC stores or processes credentials
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f3d298d0-9a70-4eb7-861a-a7f4668e0484Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.