Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19705 | All programming connections receive the same unlocked privileges, which can result in a privilege escalation. During the time Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 is unlocked by an authorized user, an attacker can connect to the PLC and read the project without authorization. |
Solution
Automation Direct reports these vulnerabilities are all mitigated by Version 3.00 and recommends users update software and firmware to the latest version. Automation Direct also recommends users follow its security guidelines.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-02 |
|
Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:31:41.100Z
Reserved: 2021-05-13T00:00:00.000Z
Link: CVE-2021-32984
Updated: 2024-08-03T23:42:19.120Z
Status : Modified
Published: 2022-04-04T20:15:09.100
Modified: 2024-11-21T06:08:03.893
Link: CVE-2021-32984
No data.
OpenCVE Enrichment
No data.
EUVD