The programming protocol allows for a previously entered password and lock state to be read by an attacker. If the previously entered password was successful, the attacker can then use the password to unlock Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-02 | Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
History
21 Nov 2024, 06:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-02 - Third Party Advisory, US Government Resource |
13 Apr 2022, 18:24
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-02 - Third Party Advisory, US Government Resource | |
CWE | CWE-522 | |
CPE | cpe:2.3:h:automationdirect:c0-10dd1e-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-11dd2e-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-11dd1e-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dd1e-1-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12are-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-10dd1e-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-10dre-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dd2e-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dd1e-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-11are-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12are-2-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-11are-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dd2e-2-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dre-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dd1e-2-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dd1e-1-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dre-1-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dre-2-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-11dd1e-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dre-1-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dre-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12are-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12are-1-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12are-2-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-10dd2e-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dd2e-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dd2e-2-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-11dre-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-10are-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dd2e-1-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12are-1-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dre-2-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-11dre-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dd2e-1-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-10dd2e-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-10are-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dd1e-2-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-10dre-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dd1e-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-11dd2e-d:-:*:*:*:*:*:*:* |
04 Apr 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-04 20:15
Updated : 2024-11-21 06:08
NVD link : CVE-2021-32978
Mitre link : CVE-2021-32978
CVE.ORG link : CVE-2021-32978
JSON object : View
Products Affected
automationdirect
- c0-11dre-d_firmware
- c0-11are-d
- c0-12dd2e-1-d
- c0-12dd1e-1-d
- c0-11are-d_firmware
- c0-12dre-d
- c0-12dd1e-1-d_firmware
- c0-12dd2e-d_firmware
- c0-12dre-1-d_firmware
- c0-12are-d_firmware
- c0-11dd1e-d
- c0-12dd2e-1-d_firmware
- c0-12are-1-d
- c0-10dd2e-d_firmware
- c0-12are-2-d
- c0-11dd2e-d_firmware
- c0-12dre-1-d
- c0-10dd1e-d_firmware
- c0-12are-1-d_firmware
- c0-10dd1e-d
- c0-12are-2-d_firmware
- c0-10are-d_firmware
- c0-12dre-2-d
- c0-11dd2e-d
- c0-12dd1e-2-d_firmware
- c0-10dd2e-d
- c0-10are-d
- c0-12dre-2-d_firmware
- c0-10dre-d
- c0-12dd1e-d
- c0-12dd2e-2-d_firmware
- c0-12dd2e-d
- c0-12dd1e-d_firmware
- c0-12dre-d_firmware
- c0-12are-d
- c0-10dre-d_firmware
- c0-11dd1e-d_firmware
- c0-12dd1e-2-d
- c0-11dre-d
- c0-12dd2e-2-d