Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-32980 : What You Need to Know

Critical CVE-2021-32980 affects Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00. Learn about the impact, technical details, and mitigation strategies.

Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 are affected by an Authentication Bypass Vulnerability that can be exploited by attackers to connect to the PLC while an existing connection is active.

Understanding CVE-2021-32980

This CVE describes a critical vulnerability in Automation Direct CLICK PLC CPU Modules that allows unauthorized access to the system.

What is CVE-2021-32980?

The vulnerability in Automation Direct CLICK PLC CPU Modules: C0-1x CPUs before firmware v3.00 allows attackers to establish additional software programming connections even while a connection is active, leading to unauthorized access.

The Impact of CVE-2021-32980

With a CVSS base score of 9.8, this critical vulnerability poses a high risk to confidentiality, integrity, and availability of affected systems, requiring immediate attention.

Technical Details of CVE-2021-32980

This section provides detailed information on the vulnerability.

Vulnerability Description

The vulnerability in CLICK PLC CPU Modules allows attackers to bypass authentication and connect to the system while an existing connection is already active, compromising system security.

Affected Systems and Versions

CLICK PLC CPU Modules: C0-1x CPUs with firmware versions prior to v3.00 are affected by this vulnerability, requiring immediate update to version 3.00.

Exploitation Mechanism

The vulnerability can be exploited by attackers to establish unauthorized connections to the PLC, potentially causing significant harm to the system.

Mitigation and Prevention

Protect your systems by following these mitigation strategies.

Immediate Steps to Take

Update the firmware of Automation Direct CLICK PLC CPU Modules to version 3.00 to mitigate the vulnerability and prevent unauthorized access.

Long-Term Security Practices

Apart from updating the firmware, follow security best practices recommended by Automation Direct to enhance overall system security.

Patching and Updates

Regularly check for updates and patches released by Automation Direct to address security vulnerabilities and ensure system protection.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now