Cleartext storage of sensitive information was discovered in Click Programming Software version v3.60. The vulnerability can be exploited by a local user with access to the file system, while an administrator session is active, to steal credentials stored in clear text.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-30930 Cleartext storage of sensitive information was discovered in Click Programming Software version v3.60. The vulnerability can be exploited by a local user with access to the file system, while an administrator session is active, to steal credentials stored in clear text.
Fixes

Solution

AutomationDirect recommends that users update CLICK PLUS and firmware to V3.80. https://www.automationdirect.com/support/software-downloads If the update cannot be applied right away, the following compensating controls are recommended until the upgrade can be performed: * Network Isolation – Disconnect the CLICK PLUS PLC from external networks (e.g., the internet or corporate LAN) to reduce exposure. * Secure Communications – Use only trusted, dedicated internal networks or air-gapped systems for device communication. * Access Control – Restrict both physical and logical access to authorized personnel only. * Application Whitelisting – Configure whitelisting so that only trusted, pre-approved applications are allowed to run. Block any unauthorized software. * Endpoint Protection – Use antivirus or EDR tools and configure host-based firewalls to block unauthorized access attempts. * Logging & Monitoring – Enable and regularly review system logs to detect suspicious or unauthorized activity. * Backup & Recovery – Maintain secure, tested backups of the PLC and its configurations to minimize downtime in case of an incident. * Ongoing Risk Assessment – Continuously evaluate risks associated with running outdated firmware and adjust compensating measures accordingly.


Workaround

No workaround given by the vendor.

History

Thu, 25 Sep 2025 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Automationdirect
Automationdirect click Plus
Vendors & Products Automationdirect
Automationdirect click Plus

Wed, 24 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 23 Sep 2025 22:15:00 +0000

Type Values Removed Values Added
Description Cleartext storage of sensitive information was discovered in Click Programming Software version v3.60. The vulnerability can be exploited by a local user with access to the file system, while an administrator session is active, to steal credentials stored in clear text.
Title AutomationDirect CLICK PLUS Cleartext Storage of Sensitive Information
Weaknesses CWE-312
References
Metrics cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 4.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-24T14:08:37.906Z

Reserved: 2025-09-16T20:09:26.633Z

Link: CVE-2025-54855

cve-icon Vulnrichment

Updated: 2025-09-24T14:08:33.392Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-23T22:15:33.980

Modified: 2025-09-24T18:11:24.520

Link: CVE-2025-54855

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-25T08:22:04Z