An attacker could decrypt sensitive data, impersonate legitimate users
or devices, and potentially gain access to network resources for lateral
attacks.
Metrics
Affected Vendors & Products
References
History
Fri, 23 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Automationdirect
Automationdirect click Plc |
|
| Vendors & Products |
Automationdirect
Automationdirect click Plc |
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker could decrypt sensitive data, impersonate legitimate users or devices, and potentially gain access to network resources for lateral attacks. | |
| Title | AutomationDirect CLICK Programmable Logic Controller Plaintext Storage of a Password | |
| Weaknesses | CWE-256 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published: 2026-01-22T22:21:17.674Z
Updated: 2026-01-23T20:10:07.680Z
Reserved: 2025-02-05T15:36:40.953Z
Link: CVE-2025-25051
Updated: 2026-01-23T20:10:03.021Z
Status : Received
Published: 2026-01-22T23:15:48.803
Modified: 2026-01-22T23:15:48.803
Link: CVE-2025-25051
No data.