After Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 is unlocked by an authorized user, the unlocked state does not timeout. If the programming software is interrupted, the PLC remains unlocked. All subsequent programming connections are allowed without authorization. The PLC is only relocked by a power cycle, or when the programming software disconnects correctly.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-02 | Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
History
21 Nov 2024, 06:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-02 - Third Party Advisory, US Government Resource |
25 Oct 2022, 19:40
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-863 |
13 Apr 2022, 17:29
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-287 | |
CPE | cpe:2.3:h:automationdirect:c0-10dd1e-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-11dd2e-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-11dd1e-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dd1e-1-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12are-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-10dd1e-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-10dre-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dd2e-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dd1e-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-11are-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12are-2-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-11are-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dd2e-2-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dre-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dd1e-2-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dd1e-1-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dre-1-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dre-2-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-11dd1e-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dre-1-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dre-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12are-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12are-1-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12are-2-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-10dd2e-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dd2e-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dd2e-2-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-11dre-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-10are-d:-:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dd2e-1-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12are-1-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dre-2-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-11dre-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dd2e-1-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-10dd2e-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-10are-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-12dd1e-2-d:-:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-10dre-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:automationdirect:c0-12dd1e-d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:automationdirect:c0-11dd2e-d:-:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-02 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
04 Apr 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-04 20:15
Updated : 2024-11-21 06:08
NVD link : CVE-2021-32986
Mitre link : CVE-2021-32986
CVE.ORG link : CVE-2021-32986
JSON object : View
Products Affected
automationdirect
- c0-11dre-d_firmware
- c0-11are-d
- c0-12dd2e-1-d
- c0-12dd1e-1-d
- c0-11are-d_firmware
- c0-12dre-d
- c0-12dd1e-1-d_firmware
- c0-12dd2e-d_firmware
- c0-12dre-1-d_firmware
- c0-12are-d_firmware
- c0-11dd1e-d
- c0-12dd2e-1-d_firmware
- c0-12are-1-d
- c0-10dd2e-d_firmware
- c0-12are-2-d
- c0-11dd2e-d_firmware
- c0-12dre-1-d
- c0-10dd1e-d_firmware
- c0-12are-1-d_firmware
- c0-10dd1e-d
- c0-12are-2-d_firmware
- c0-10are-d_firmware
- c0-12dre-2-d
- c0-11dd2e-d
- c0-12dd1e-2-d_firmware
- c0-10dd2e-d
- c0-10are-d
- c0-12dre-2-d_firmware
- c0-10dre-d
- c0-12dd1e-d
- c0-12dd2e-2-d_firmware
- c0-12dd2e-d
- c0-12dd1e-d_firmware
- c0-12dre-d_firmware
- c0-12are-d
- c0-10dre-d_firmware
- c0-11dd1e-d_firmware
- c0-12dd1e-2-d
- c0-11dre-d
- c0-12dd2e-2-d