A critical security vulnerability (CVE-2025-7353, CVSS 9.8) was discovered in Rockwell Automation’s **ControlLogix Ethernet communication modules**, exposing industrial control systems (ICS) to remote code execution (RCE) attacks. The flaw stems from an **insecure default configuration** in the web-based debugger (WDB) agent, left enabled in production environments. Unauthenticated attackers exploiting this vulnerability can **dump memory, modify system operations, and manipulate industrial processes**, posing severe risks to manufacturing, energy, or critical infrastructure.The affected modules (e.g., **1756-EN2T/D, 1756-EN3TR/B**) serve as core interfaces between programmable automation controllers (PACs) and Ethernet networks. Successful exploitation could lead to **operational disruptions, unauthorized access to sensitive data, or physical damage**—such as halting factory production, tampering with safety systems, or causing cascading failures in industrial environments. While Rockwell released a patch (firmware **12.001**), delayed updates increase exposure, particularly in sectors like **energy, water treatment, or nuclear plants**, where such attacks could escalate to **life-threatening scenarios or regional economic threats** if critical services are compromised.
Source: https://cybersecuritynews.com/rockwell-controllogix-ethernet-vulnerability/
TPRM report: https://www.rankiteo.com/company/rockwell-automation
"id": "roc405081825",
"linkid": "rockwell-automation",
"type": "Vulnerability",
"date": "6/2025",
"severity": "100",
"impact": "7",
"explanation": "Attack that could injure or kill people"
{'affected_entities': [{'industry': ['Industrial Automation',
'Manufacturing',
'Critical Infrastructure'],
'location': 'Milwaukee, Wisconsin, USA',
'name': 'Rockwell Automation',
'type': 'Corporation'}],
'attack_vector': ['Network-based',
'Unauthenticated access to WDB agent',
'Exploitation of debugging interface'],
'customer_advisories': ['Urgent recommendation to update firmware and '
'implement mitigations'],
'data_breach': {'data_exfiltration': 'Possible (memory dumps, system control)',
'sensitivity_of_data': 'High (industrial control system data)',
'type_of_data_compromised': ['Operational data',
'Industrial process information',
'System memory']},
'date_publicly_disclosed': '2025-08-14',
'description': 'A critical security vulnerability (CVE-2025-7353, CVSS 9.8) '
'was discovered in Rockwell Automation’s ControlLogix Ethernet '
'communication modules, allowing unauthenticated remote '
'attackers to execute arbitrary code, dump memory, and control '
'industrial systems. The flaw stems from an insecure default '
'configuration in the web-based debugger (WDB) agent, which '
'remains enabled in production environments. Affected models '
'include 1756-EN2T/D, 1756-EN2F/C, 1756-EN2TR/C, 1756-EN3TR/B, '
'and 1756-EN2TP/A running firmware ≤11.004. Exploitation '
'requires network access and a connection to the WDB agent via '
'specific IP addresses, with no authentication or user '
'interaction needed. Successful attacks could manipulate '
'industrial processes, access sensitive data, or disrupt '
'operations.',
'impact': {'data_compromised': ['Operational data',
'Sensitive industrial process information'],
'operational_impact': ['Potential manipulation of industrial '
'processes',
'Disruption of manufacturing operations',
'Unauthorized access to control systems'],
'systems_affected': [{'firmware': '≤11.004',
'model': '1756-EN2T/D'},
{'firmware': '≤11.004',
'model': '1756-EN2F/C'},
{'firmware': '≤11.004',
'model': '1756-EN2TR/C'},
{'firmware': '≤11.004',
'model': '1756-EN3TR/B'},
{'firmware': '≤11.004',
'model': '1756-EN2TP/A'}]},
'investigation_status': 'Disclosed; mitigation available (firmware update)',
'lessons_learned': ['Avoid shipping products with debugging interfaces '
'enabled by default in production environments.',
'Prioritize firmware updates for critical industrial '
'control systems.',
'Implement network segmentation and access controls for '
'industrial automation networks.',
'Conduct regular security assessments of industrial '
'infrastructure to identify similar vulnerabilities.'],
'post_incident_analysis': {'corrective_actions': ['Firmware update to disable '
'WDB agent by default',
'Network segmentation and '
'access controls for '
'industrial systems',
'Enhanced monitoring for '
'unauthorized access '
'attempts'],
'root_causes': ['Insecure default configuration '
'(WDB agent enabled in production)',
'Lack of authentication for '
'debugging interface',
'Network-exposed critical '
'industrial control components']},
'recommendations': ['Immediately update affected ControlLogix Ethernet '
'modules to firmware version 12.001.',
'Implement network segmentation to isolate industrial '
'control systems if patching is delayed.',
'Apply firewall rules to restrict access to debugging '
'interfaces (e.g., WDB agent).',
'Monitor network traffic for suspicious activities '
'targeting industrial devices.',
'Perform security assessments to identify and mitigate '
'similar vulnerabilities in other systems.'],
'references': [{'date_accessed': '2025-08-14',
'source': 'Rockwell Automation Security Advisory'}],
'response': {'communication_strategy': ['Public security advisory (published '
'2025-08-14)'],
'containment_measures': ['Network segmentation',
'Firewall rules to restrict WDB agent '
'access'],
'enhanced_monitoring': 'Continuous monitoring of network traffic '
'for suspicious activities',
'network_segmentation': 'Recommended for environments where '
'immediate patching is not feasible',
'remediation_measures': ['Firmware update to version 12.001',
'Disabling WDB agent in production']},
'stakeholder_advisories': ['Public security advisory issued by Rockwell '
'Automation'],
'title': 'Critical Remote Code Execution Vulnerability in Rockwell Automation '
'ControlLogix Ethernet Modules (CVE-2025-7353)',
'type': ['Vulnerability',
'Remote Code Execution (RCE)',
'Insecure Default Configuration'],
'vulnerability_exploited': {'cve_id': 'CVE-2025-7353',
'cvss_score': 9.8,
'cvss_vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H',
'cwe_id': 'CWE-1188',
'description': 'Insecure default configuration in '
'the web-based debugger (WDB) '
'agent, enabled on production '
'devices.'}}