The use of a hard-coded cryptographic key was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software contains a hard-coded AES key used to protect the initial messages of a new KOPS session.
Metrics
Affected Vendors & Products
References
History
Thu, 25 Sep 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Automationdirect
Automationdirect click Plus |
|
| Vendors & Products |
Automationdirect
Automationdirect click Plus |
Wed, 24 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 23 Sep 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The use of a hard-coded cryptographic key was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software contains a hard-coded AES key used to protect the initial messages of a new KOPS session. | |
| Title | AutomationDirect CLICK PLUS Use of Hard-coded Cryptographic Key | |
| Weaknesses | CWE-321 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published: 2025-09-23T22:04:58.449Z
Updated: 2025-09-24T14:08:24.132Z
Reserved: 2025-09-16T20:09:26.602Z
Link: CVE-2025-58069
Updated: 2025-09-24T14:08:20.053Z
Status : Awaiting Analysis
Published: 2025-09-23T22:15:34.187
Modified: 2025-09-24T18:11:24.520
Link: CVE-2025-58069
No data.