An attacker could decrypt sensitive data, impersonate legitimate users or devices, and potentially gain access to network resources for lateral attacks.
History

Fri, 23 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Automationdirect
Automationdirect click Plc
Vendors & Products Automationdirect
Automationdirect click Plc

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description An attacker could decrypt sensitive data, impersonate legitimate users or devices, and potentially gain access to network resources for lateral attacks.
Title AutomationDirect CLICK Programmable Logic Controller Plaintext Storage of a Password
Weaknesses CWE-256
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2026-01-22T22:21:17.674Z

Updated: 2026-01-23T20:10:07.680Z

Reserved: 2025-02-05T15:36:40.953Z

Link: CVE-2025-25051

cve-icon Vulnrichment

Updated: 2026-01-23T20:10:03.021Z

cve-icon NVD

Status : Received

Published: 2026-01-22T23:15:48.803

Modified: 2026-01-22T23:15:48.803

Link: CVE-2025-25051

cve-icon Redhat

No data.