CVE-2025-58069

5.3 MEDIUM

📋 TL;DR

CVE-2025-58069 is a hard-coded cryptographic key vulnerability in Click Plus PLC firmware version 3.60. This allows attackers to decrypt initial session messages and potentially compromise PLC communications. Organizations using affected Click Plus PLCs in industrial control systems are impacted.

💻 Affected Systems

Products:
  • Click Plus PLC
Versions: Firmware version 3.60
Operating Systems: PLC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the vulnerable firmware version; requires network access to PLC communications.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of PLC communications leading to unauthorized control of industrial processes, production disruption, or safety system manipulation.

🟠

Likely Case

Session interception and decryption allowing attackers to monitor or manipulate initial PLC communications.

🟢

If Mitigated

Limited impact if network segmentation and monitoring prevent access to PLC communications.

🌐 Internet-Facing: MEDIUM - If PLCs are directly internet-accessible, attackers could exploit this without internal access.
🏢 Internal Only: HIGH - Attackers with internal network access can exploit this to compromise PLC communications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network access to intercept KOPS session traffic and knowledge of the hard-coded AES key.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for updated firmware

Vendor Advisory: https://www.automationdirect.com/support/software-downloads

Restart Required: No

Instructions:

1. Check vendor advisory for updated firmware. 2. Download and install updated firmware from vendor site. 3. Verify firmware version after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLCs from untrusted networks and implement strict firewall rules.

Session Monitoring

all

Monitor network traffic for unusual KOPS session initiation patterns.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PLCs from potential attackers.
  • Deploy network monitoring and intrusion detection specifically for industrial control traffic.

🔍 How to Verify

Check if Vulnerable:

Check PLC firmware version via vendor management interface; version 3.60 is vulnerable.

Check Version:

Use vendor-specific PLC management tools to check firmware version.

Verify Fix Applied:

Verify firmware version after update shows a version higher than 3.60.

📡 Detection & Monitoring

Log Indicators:

  • Unusual KOPS session initiation patterns
  • Multiple failed session attempts

Network Indicators:

  • Unusual traffic to PLC ports
  • Suspicious session initiation patterns

SIEM Query:

Search for network traffic to PLC ports with unusual patterns or from unauthorized sources.

🔗 References

📤 Share & Export