Cleartext storage of sensitive information was discovered in Click Programming Software version v3.60. The vulnerability can be exploited by a local user with access to the file system, while an administrator session is active, to steal credentials stored in clear text.
Fixes

Solution

AutomationDirect recommends that users update CLICK PLUS and firmware to V3.80. https://www.automationdirect.com/support/software-downloads If the update cannot be applied right away, the following compensating controls are recommended until the upgrade can be performed: * Network Isolation – Disconnect the CLICK PLUS PLC from external networks (e.g., the internet or corporate LAN) to reduce exposure. * Secure Communications – Use only trusted, dedicated internal networks or air-gapped systems for device communication. * Access Control – Restrict both physical and logical access to authorized personnel only. * Application Whitelisting – Configure whitelisting so that only trusted, pre-approved applications are allowed to run. Block any unauthorized software. * Endpoint Protection – Use antivirus or EDR tools and configure host-based firewalls to block unauthorized access attempts. * Logging & Monitoring – Enable and regularly review system logs to detect suspicious or unauthorized activity. * Backup & Recovery – Maintain secure, tested backups of the PLC and its configurations to minimize downtime in case of an incident. * Ongoing Risk Assessment – Continuously evaluate risks associated with running outdated firmware and adjust compensating measures accordingly.


Workaround

No workaround given by the vendor.

History

Tue, 23 Sep 2025 22:15:00 +0000

Type Values Removed Values Added
Description Cleartext storage of sensitive information was discovered in Click Programming Software version v3.60. The vulnerability can be exploited by a local user with access to the file system, while an administrator session is active, to steal credentials stored in clear text.
Title AutomationDirect CLICK PLUS Cleartext Storage of Sensitive Information
Weaknesses CWE-312
References
Metrics cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 4.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-23T22:01:25.924Z

Reserved: 2025-09-16T20:09:26.633Z

Link: CVE-2025-54855

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-23T22:15:33.980

Modified: 2025-09-23T22:15:33.980

Link: CVE-2025-54855

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.