Description
An authorization bypass vulnerability has been discovered in the Click Plus C2-03CPU2 device firmware version 3.60. Through the KOPR protocol utilized by the Remote PLC application, authenticated users with low-level access permissions can exploit this vulnerability to read and modify PLC variables beyond their intended authorization level.
Published: 2025-09-23
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

AutomationDirect recommends that users update CLICK PLUS and firmware to V3.80. https://www.automationdirect.com/support/software-downloads If the update cannot be applied right away, the following compensating controls are recommended until the upgrade can be performed: * Network Isolation – Disconnect the CLICK PLUS PLC from external networks (e.g., the internet or corporate LAN) to reduce exposure. * Secure Communications – Use only trusted, dedicated internal networks or air-gapped systems for device communication. * Access Control – Restrict both physical and logical access to authorized personnel only. * Application Whitelisting – Configure whitelisting so that only trusted, pre-approved applications are allowed to run. Block any unauthorized software. * Endpoint Protection – Use antivirus or EDR tools and configure host-based firewalls to block unauthorized access attempts. * Logging & Monitoring – Enable and regularly review system logs to detect suspicious or unauthorized activity. * Backup & Recovery – Maintain secure, tested backups of the PLC and its configurations to minimize downtime in case of an incident. * Ongoing Risk Assessment – Continuously evaluate risks associated with running outdated firmware and adjust compensating measures accordingly.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-30934 An authorization bypass vulnerability has been discovered in the Click Plus C2-03CPU2 device firmware version 3.60. Through the KOPR protocol utilized by the Remote PLC application, authenticated users with low-level access permissions can exploit this vulnerability to read and modify PLC variables beyond their intended authorization level.
History

Thu, 25 Sep 2025 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Automationdirect
Automationdirect click Plus
Vendors & Products Automationdirect
Automationdirect click Plus

Wed, 24 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 23 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description An authorization bypass vulnerability has been discovered in the Click Plus C2-03CPU2 device firmware version 3.60. Through the KOPR protocol utilized by the Remote PLC application, authenticated users with low-level access permissions can exploit this vulnerability to read and modify PLC variables beyond their intended authorization level.
Title AutomationDirect CLICK PLUS Missing Authorization
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 7.6, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Automationdirect Click Plus
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-24T14:07:38.232Z

Reserved: 2025-09-16T20:09:26.660Z

Link: CVE-2025-55038

cve-icon Vulnrichment

Updated: 2025-09-24T14:07:33.432Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-23T23:15:30.497

Modified: 2025-09-24T18:11:24.520

Link: CVE-2025-55038

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-25T08:22:13Z

Weaknesses