After Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 is unlocked by an authorized user, the unlocked state does not timeout. If the programming software is interrupted, the PLC remains unlocked. All subsequent programming connections are allowed without authorization. The PLC is only relocked by a power cycle, or when the programming software disconnects correctly.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-19707 After Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 is unlocked by an authorized user, the unlocked state does not timeout. If the programming software is interrupted, the PLC remains unlocked. All subsequent programming connections are allowed without authorization. The PLC is only relocked by a power cycle, or when the programming software disconnects correctly.
Fixes

Solution

Automation Direct reports these vulnerabilities are all mitigated by Version 3.00 and recommends users update software and firmware to the latest version. Automation Direct also recommends users follow its security guidelines.


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:31:33.851Z

Reserved: 2021-05-13T00:00:00.000Z

Link: CVE-2021-32986

cve-icon Vulnrichment

Updated: 2024-08-03T23:42:19.029Z

cve-icon NVD

Status : Modified

Published: 2022-04-04T20:15:09.207

Modified: 2024-11-21T06:08:04.207

Link: CVE-2021-32986

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.