CVE-2021-32982

7.5 HIGH

📋 TL;DR

Automation Direct CLICK PLC CPU modules with vulnerable firmware transmit passwords in plaintext during unlocking and project transfers. This allows attackers with network visibility to capture credentials and potentially gain unauthorized access to industrial control systems. Organizations using C0-1x CPUs with firmware before v3.00 are affected.

💻 Affected Systems

Products:
  • Automation Direct CLICK PLC C0-1x CPU modules
Versions: All firmware versions prior to v3.00
Operating Systems: PLC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects password exchange during unlocking operations and project file transfers. Requires network visibility to the PLC communication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker captures administrative passwords, gains full control of PLCs, modifies industrial processes, causes physical damage, or disrupts critical operations.

🟠

Likely Case

Attacker captures passwords through network sniffing, gains unauthorized access to PLC programming and configuration, potentially altering logic or stealing intellectual property.

🟢

If Mitigated

With network segmentation and monitoring, attackers may capture passwords but cannot reach PLCs to use them, limiting impact to credential exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to observe password transmission. No authentication bypass needed to capture credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.00

Vendor Advisory: https://www.automationdirect.com/support/security-advisories

Restart Required: Yes

Instructions:

1. Download firmware v3.00 from Automation Direct website. 2. Connect to PLC via programming software. 3. Backup current project. 4. Upload new firmware. 5. Restart PLC. 6. Verify firmware version.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLCs on separate VLANs with strict firewall rules to prevent unauthorized network access.

Encrypted VPN Tunnel

all

Use VPN for all PLC communications to encrypt password transmission.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PLCs from untrusted networks
  • Use out-of-band management networks for PLC programming and maintenance

🔍 How to Verify

Check if Vulnerable:

Check firmware version in CLICK Programming Software under CPU Status. If version is below 3.00, system is vulnerable.

Check Version:

Use CLICK Programming Software: Connect to PLC → View CPU Status → Check Firmware Version

Verify Fix Applied:

Confirm firmware version shows 3.00 or higher in CLICK Programming Software CPU Status.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts after password changes
  • Unusual project upload/download activity

Network Indicators:

  • Plaintext password strings in network captures of PLC communications
  • Unauthorized connections to PLC programming ports

SIEM Query:

source="network_traffic" AND (dest_port=20256 OR dest_port=44818) AND content="password"

🔗 References

📤 Share & Export