Rockwell Automation ControlLogix Ethernet Modules

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 9.3
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Rockwell Automation
  • Equipment: ControlLogix Ethernet Modules
  • Vulnerability: Initialization of a Resource with an Insecure Default

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow remote attackers to perform memory dumps, modify memory, and control execution flow.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of Rockwell Automation ControlLogix Ethernet Modules are affected:

  • 1756-EN2T/D: Version 11.004 or below
  • 1756-EN2F/C: Version 11.004 or below
  • 1756-EN2TR/C: Version 11.004 or below
  • 1756-EN3TR/B: Version 11.004 or below
  • 1756-EN2TP/A: Version 11.004 or below

3.2 VULNERABILITY OVERVIEW

3.2.1 Initialization of a Resource with an Insecure Default CWE-1188

Rockwell Automation ControlLogix Ethernet Modules are vulnerable to a security issue where the web-based debugger agent is enabled by default on released devices. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow.

CVE-2025-7353 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2025-7353. A base score of 9.3 has been calculated; the CVSS vector string is (This article has been indexed from All CISA Advisories

Read the original article:

Rockwell Automation ControlLogix Ethernet Modules