Discover the critical CVE-2021-32986 affecting Automation Direct CLICK PLC CPU Modules. Learn about the authentication bypass vulnerability, its impact, and essential mitigation steps.
Automation Direct CLICK PLC CPU Modules are affected by an authentication bypass vulnerability allowing unauthorized access without timeout until reboot. The severity of this vulnerability is rated as critical with a CVSS base score of 9.8.
Understanding CVE-2021-32986
This CVE involves an authentication bypass using an alternate path or channel in Automation Direct CLICK PLC CPU Modules, specifically affecting C0-1x CPUs with firmware versions prior to 3.00.
What is CVE-2021-32986?
The vulnerability enables an authorized user to unlock the PLC without a timeout, allowing subsequent unauthorized programming connections until a power cycle or correct software disconnection.
The Impact of CVE-2021-32986
With a base severity of critical and high impacts on confidentiality, integrity, and availability, this vulnerability poses significant risks to affected systems, potentially leading to unauthorized access and control.
Technical Details of CVE-2021-32986
This section provides specific technical details regarding the CVE.
Vulnerability Description
After being unlocked by an authorized user, Automation Direct CLICK PLC CPU Modules with firmware versions below 3.00 do not automatically timeout, allowing unauthorized programming connections.
Affected Systems and Versions
The vulnerability affects CLICK PLC CPU Modules: C0-1x CPUs with firmware versions less than 3.00.
Exploitation Mechanism
Unauthorized users can exploit this vulnerability by unlocking the PLC without a timeout, granting them unrestricted access.
Mitigation and Prevention
Efficient mitigation and prevention strategies are crucial to address this critical vulnerability.
Immediate Steps to Take
Automation Direct recommends updating to Version 3.00 and following security guidelines to mitigate the vulnerability's impact.
Long-Term Security Practices
Following best security practices, such as regular software updates and network monitoring, can enhance overall system security.
Patching and Updates
Regularly applying software and firmware updates from Automation Direct is essential to mitigate the risks associated with CVE-2021-32986.