Major PLC Vulnerabilities Uncovered: CLICK Plus Exploits Threaten Factories (2026)

Critical Flaws Exposed in Widely-Used Industrial Controllers: Are Your Operations at Risk?

In a startling revelation, cybersecurity experts at Nozomi Networks have unearthed a series of vulnerabilities within AutomationDirect's CLICK Plus Programmable Logic Controllers (PLCs), devices integral to countless industrial and commercial systems. These flaws, spanning wireless protocols and workstation software, could potentially grant attackers unprecedented access to critical infrastructure, from factory machinery to amusement park rides. But here's where it gets controversial: despite the severity of these findings, many organizations might still be unaware of the risks lurking within their own systems.

Nozomi's research, focusing on the C2-03CPU-2 model with its Wi-Fi and Bluetooth capabilities, revealed seven distinct vulnerabilities. These weaknesses were not just theoretical; they could allow attackers to decrypt traffic, steal credentials, and manipulate device behavior, leading to catastrophic consequences. The researchers meticulously analyzed the proprietary UDP-based protocol used for communication, uncovering implementation flaws that compromise encryption and authentication. And this is the part most people miss: even with standard operational controls in place, attackers can exploit various entry points, from physical network access to misconfigured VPNs, to initiate their malicious campaigns.

The attack chain begins with the attacker gaining a foothold on the network, either through physical access, exploiting exposed interfaces, or compromising connected devices. Once positioned, they passively monitor traffic, waiting for an operator to connect to the PLC. Upon detecting a login, the attacker inspects the exchanged data, leveraging protocol flaws to decrypt traffic and recover credentials. With these credentials, they can authenticate to the PLC, effectively blocking legitimate operator access.

The Real Danger: Unchecked Manipulation of Critical Systems

What makes these vulnerabilities particularly alarming is the potential for attackers to alter the behavior of industrial systems without detection. By exploiting additional protocol flaws, attackers can saturate available sessions, blind monitoring interfaces, and operate undisturbed. This enables them to manipulate I/O values, alter conveyor belt speeds, disable safety interlocks, and falsify sensor readings—actions that can lead to product destruction, production halts, and even physical harm to operators. For instance, imagine a scenario where an amusement park ride's safety mechanisms are overridden, putting riders at grave risk.

These vulnerabilities align with several tactics in the MITRE ATT&CK for ICS framework, highlighting their significance in real-world attack scenarios. Protocol weaknesses allow attackers to exfiltrate sensitive data, disrupt telemetry, and execute unauthorized control actions. Moreover, weak cryptography and predictable key generation enable passive decryption of traffic, exposing operational data that could be used for espionage or further attacks.

What’s Being Done—And What You Can Do

AutomationDirect has responded by releasing security patches for the CLICK Plus firmware and programming software, with CISA issuing a detailed advisory. However, the onus is now on asset owners and operators to take immediate action: update affected devices and workstations, implement robust network segmentation, and monitor for vulnerable assets. Nozomi Networks' OT/IoT Security Platform offers a proactive solution, providing deep visibility into network traffic and host activities to detect and mitigate threats effectively.

A Call to Action: Are We Doing Enough to Secure Our Critical Infrastructure?

As we reflect on these findings, a critical question arises: Are current security measures sufficient to protect our increasingly interconnected industrial systems? While patches and updates are essential, the ease with which attackers can exploit these vulnerabilities underscores the need for a more holistic approach to cybersecurity. What steps is your organization taking to safeguard against such threats? Share your thoughts and experiences in the comments—let’s spark a conversation that could shape the future of industrial cybersecurity.

Major PLC Vulnerabilities Uncovered: CLICK Plus Exploits Threaten Factories (2026)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Ms. Lucile Johns

Last Updated:

Views: 6244

Rating: 4 / 5 (61 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Ms. Lucile Johns

Birthday: 1999-11-16

Address: Suite 237 56046 Walsh Coves, West Enid, VT 46557

Phone: +59115435987187

Job: Education Supervisor

Hobby: Genealogy, Stone skipping, Skydiving, Nordic skating, Couponing, Coloring, Gardening

Introduction: My name is Ms. Lucile Johns, I am a successful, friendly, friendly, homely, adventurous, handsome, delightful person who loves writing and wants to share my knowledge and understanding with you.