CVE-2025-59484

8.3 HIGH

📋 TL;DR

This CVE describes an insecure RSA implementation in Click Plus PLC firmware version 3.60, allowing attackers to potentially decrypt sensitive data or forge communications. Industrial control systems using this vulnerable firmware are affected, particularly in manufacturing and critical infrastructure environments.

💻 Affected Systems

Products:
  • Click Plus PLC
Versions: Firmware version 3.60
Operating Systems: Embedded PLC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All systems running the vulnerable firmware version are affected regardless of configuration

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of PLC communications leading to unauthorized control of industrial processes, production disruption, or safety system manipulation

🟠

Likely Case

Interception and decryption of sensitive operational data, potential for man-in-the-middle attacks on PLC communications

🟢

If Mitigated

Limited impact if network segmentation and encryption controls prevent access to vulnerable systems

🌐 Internet-Facing: HIGH if PLCs are directly internet-accessible, as cryptographic weaknesses are remotely exploitable
🏢 Internal Only: MEDIUM to HIGH depending on network segmentation and attacker access to the industrial network

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires cryptographic analysis capabilities but no authentication to the PLC

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for updated firmware

Vendor Advisory: https://www.automationdirect.com/support/software-downloads

Restart Required: Yes

Instructions:

1. Download updated firmware from vendor site 2. Backup current configuration 3. Apply firmware update via programming software 4. Restart PLC 5. Verify firmware version

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLCs in dedicated industrial network segments with strict firewall rules

Encryption Layer

all

Implement additional encryption (IPsec/VPN) for PLC communications

🧯 If You Can't Patch

  • Implement strict network access controls to limit communication to authorized systems only
  • Monitor network traffic for unusual patterns or cryptographic attacks against PLC communications

🔍 How to Verify

Check if Vulnerable:

Check PLC firmware version via programming software or web interface

Check Version:

Use Click programming software to read PLC firmware version

Verify Fix Applied:

Confirm firmware version is updated beyond 3.60 and test RSA implementation

📡 Detection & Monitoring

Log Indicators:

  • Unusual network traffic patterns to PLC ports
  • Multiple failed cryptographic operations

Network Indicators:

  • Unusual traffic to PLC communication ports (typically 502/TCP for Modbus)
  • Patterns consistent with cryptographic attacks

SIEM Query:

source_ip=* dest_ip=PLC_IP port=502 AND (event_type="crypto_failure" OR packet_size>threshold)

🔗 References

📤 Share & Export