CVE-2025-59484
BaseFortify
Publication date: 2025-09-23
Last updated on: 2025-09-24
Assigner: ICS-CERT
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| automationdirect | click_plus_plc | 3.60 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the use of a broken or risky cryptographic algorithm in firmware version 3.60 of the Click Plus PLC. Specifically, the software uses an insecure implementation of the RSA encryption algorithm, which can compromise the security of encrypted data.
How can this vulnerability impact me? :
The insecure RSA implementation can lead to unauthorized disclosure, modification, or disruption of data and system operations. This can result in a high impact on confidentiality and integrity, and a low impact on availability, potentially allowing attackers to compromise sensitive information or disrupt device functionality.