CVE-2025-55069

8.3 HIGH

📋 TL;DR

A predictable seed in the pseudo-random number generator in Click Plus PLC firmware version 3.60 allows attackers to predict generated private keys. This compromises cryptographic security, potentially enabling unauthorized access or data manipulation. Organizations using affected PLCs in industrial control systems are at risk.

💻 Affected Systems

Products:
  • Click Plus PLC
Versions: Firmware version 3.60
Operating Systems: PLC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All systems running the vulnerable firmware version are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of PLC security allowing unauthorized control of industrial processes, data theft, or manipulation of critical infrastructure operations.

🟠

Likely Case

Unauthorized access to PLC systems leading to operational disruption, data exfiltration, or manipulation of industrial processes.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable systems.

🌐 Internet-Facing: HIGH - Internet-exposed PLCs with this vulnerability can be directly attacked to compromise cryptographic operations.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to gain unauthorized access to PLC operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires understanding of the predictable seed pattern but does not require authentication to the PLC.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for patched version

Vendor Advisory: https://www.automationdirect.com/support/software-downloads

Restart Required: Yes

Instructions:

1. Check vendor advisory for patched firmware version. 2. Download updated firmware from vendor site. 3. Backup PLC configuration. 4. Apply firmware update following vendor instructions. 5. Restart PLC. 6. Verify firmware version.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLCs from untrusted networks and internet access

Access Control Restrictions

all

Implement strict access controls to limit who can communicate with PLCs

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable PLCs from untrusted networks
  • Monitor network traffic to/from PLCs for suspicious cryptographic operations

🔍 How to Verify

Check if Vulnerable:

Check PLC firmware version via programming software or HMI interface

Check Version:

Use Click programming software to read PLC firmware version

Verify Fix Applied:

Verify firmware version has been updated to patched version

📡 Detection & Monitoring

Log Indicators:

  • Unusual cryptographic operations
  • Unauthorized access attempts to PLC

Network Indicators:

  • Suspicious traffic patterns to PLC ports
  • Unexpected cryptographic protocol usage

SIEM Query:

source_ip=PLC_IP AND (protocol=cryptographic OR port=502) AND event_type=anomaly

🔗 References

📤 Share & Export