The use of a broken or risky cryptographic algorithm was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software uses an insecure implementation of the RSA encryption algorithm.
Fixes

Solution

AutomationDirect recommends that users update CLICK PLUS and firmware to V3.80. https://www.automationdirect.com/support/software-downloads If the update cannot be applied right away, the following compensating controls are recommended until the upgrade can be performed: * Network Isolation – Disconnect the CLICK PLUS PLC from external networks (e.g., the internet or corporate LAN) to reduce exposure. * Secure Communications – Use only trusted, dedicated internal networks or air-gapped systems for device communication. * Access Control – Restrict both physical and logical access to authorized personnel only. * Application Whitelisting – Configure whitelisting so that only trusted, pre-approved applications are allowed to run. Block any unauthorized software. * Endpoint Protection – Use antivirus or EDR tools and configure host-based firewalls to block unauthorized access attempts. * Logging & Monitoring – Enable and regularly review system logs to detect suspicious or unauthorized activity. * Backup & Recovery – Maintain secure, tested backups of the PLC and its configurations to minimize downtime in case of an incident. * Ongoing Risk Assessment – Continuously evaluate risks associated with running outdated firmware and adjust compensating measures accordingly.


Workaround

No workaround given by the vendor.

History

Tue, 23 Sep 2025 22:15:00 +0000

Type Values Removed Values Added
Description The use of a broken or risky cryptographic algorithm was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software uses an insecure implementation of the RSA encryption algorithm.
Title AutomationDirect CLICK PLUS Use of a Broken or Risky Cryptographic Algorithm
Weaknesses CWE-327
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-23T22:08:40.744Z

Reserved: 2025-09-16T20:09:26.619Z

Link: CVE-2025-59484

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-23T22:15:34.360

Modified: 2025-09-23T22:15:34.360

Link: CVE-2025-59484

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.