An attacker with access to the project file could use the exposed
credentials to impersonate users, escalate privileges, or gain
unauthorized access to systems and services. The absence of robust
encryption or secure handling mechanisms increases the likelihood of
this type of exploitation, leaving sensitive information more
vulnerable.
Metrics
Affected Vendors & Products
References
History
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker with access to the project file could use the exposed credentials to impersonate users, escalate privileges, or gain unauthorized access to systems and services. The absence of robust encryption or secure handling mechanisms increases the likelihood of this type of exploitation, leaving sensitive information more vulnerable. | |
| Title | AutomationDirect CLICK Programmable Logic Controller Weak Encoding for Password | |
| Weaknesses | CWE-261 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-01-22T22:17:53.763Z
Reserved: 2025-12-09T20:15:49.604Z
Link: CVE-2025-67652
No data.
Status : Received
Published: 2026-01-22T23:15:50.300
Modified: 2026-01-22T23:15:50.300
Link: CVE-2025-67652
No data.
OpenCVE Enrichment
No data.