Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19707 | After Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 is unlocked by an authorized user, the unlocked state does not timeout. If the programming software is interrupted, the PLC remains unlocked. All subsequent programming connections are allowed without authorization. The PLC is only relocked by a power cycle, or when the programming software disconnects correctly. |
Solution
Automation Direct reports these vulnerabilities are all mitigated by Version 3.00 and recommends users update software and firmware to the latest version. Automation Direct also recommends users follow its security guidelines.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-02 |
|
Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:31:33.851Z
Reserved: 2021-05-13T00:00:00.000Z
Link: CVE-2021-32986
Updated: 2024-08-03T23:42:19.029Z
Status : Modified
Published: 2022-04-04T20:15:09.207
Modified: 2024-11-21T06:08:04.207
Link: CVE-2021-32986
No data.
OpenCVE Enrichment
No data.
EUVD