CVE-2025-55069
BaseFortify
Publication date: 2025-09-23
Last updated on: 2025-09-24
Assigner: ICS-CERT
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| automationdirect | click_plus_plc | 3.60 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-337 | A Pseudo-Random Number Generator (PRNG) is initialized from a predictable seed, such as the process ID or system time. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is due to the use of a predictable seed in the pseudo-random number generator within firmware version 3.60 of the Click Plus PLC. Because the seed is predictable, the private keys generated by this software can be compromised, weakening the security of cryptographic operations.
How can this vulnerability impact me? :
The vulnerability can lead to the compromise of private keys generated by the device, which may allow attackers to decrypt sensitive information, impersonate the device, or perform unauthorized actions, resulting in high confidentiality and integrity impacts and a low impact on availability.