The use of a hard-coded cryptographic key was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software contains a hard-coded AES key used to protect the initial messages of a new KOPS session.
Metrics
Affected Vendors & Products
References
History
Thu, 25 Sep 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Automationdirect
Automationdirect click Plus |
|
Vendors & Products |
Automationdirect
Automationdirect click Plus |
Wed, 24 Sep 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 23 Sep 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The use of a hard-coded cryptographic key was discovered in firmware version 3.60 of the Click Plus PLC. The vulnerability relies on the fact that the software contains a hard-coded AES key used to protect the initial messages of a new KOPS session. | |
Title | AutomationDirect CLICK PLUS Use of Hard-coded Cryptographic Key | |
Weaknesses | CWE-321 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published: 2025-09-23T22:04:58.449Z
Updated: 2025-09-24T14:08:24.132Z
Reserved: 2025-09-16T20:09:26.602Z
Link: CVE-2025-58069

Updated: 2025-09-24T14:08:20.053Z

Status : Awaiting Analysis
Published: 2025-09-23T22:15:34.187
Modified: 2025-09-24T18:11:24.520
Link: CVE-2025-58069

No data.