Critical Vulnerability in Rockwell ControlLogix Ethernet Modules Allows Remote Code Execution

A significant security flaw has been identified in Rockwell Automation’s ControlLogix Ethernet communication modules, potentially enabling remote attackers to execute arbitrary code within industrial control systems. This vulnerability, designated as CVE-2025-7353, affects multiple ControlLogix Ethernet modules and has been assigned a maximum Common Vulnerability Scoring System (CVSS) score of 9.8, underscoring its critical nature in industrial automation settings.

Key Points:

1. Critical Flaw in ControlLogix Ethernet Modules: The vulnerability arises from an enabled web debugger agent in the affected modules.
2. Potential for Remote Code Execution: Unauthenticated attackers can exploit this flaw to execute code remotely, perform memory dumps, and gain control over industrial systems.
3. Immediate Action Required: Organizations are urged to update affected devices promptly and implement network segmentation if immediate patching isn’t feasible.

Discovery and Disclosure:

Rockwell Automation disclosed this security issue on August 14, 2025, following its identification during internal testing procedures. The vulnerability originates from an insecure default configuration in the web-based debugger (WDB) agent, which remains active on production devices. This debugging interface, intended solely for development purposes, becomes a significant security risk when left enabled in operational environments.

Technical Details:

The CVE-2025-7353 vulnerability allows unauthenticated remote attackers to connect using specific IP addresses to access the WDB agent’s functionality. Classified under CWE-1188: Initialization of a Resource with an Insecure Default, this flaw highlights the critical issue of deploying products with debugging capabilities enabled by default.

The CVSS 3.1 vector string for this vulnerability is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. This indicates that the vulnerability can be exploited over a network with low complexity, requires no privileges or user interaction, and has a high impact on confidentiality, integrity, and availability.

Affected Products:

The vulnerability impacts several ControlLogix Ethernet communication modules, specifically:

– 1756-EN2T/D
– 1756-EN2F/C
– 1756-EN2TR/C
– 1756-EN3TR/B
– 1756-EN2TP/A

These models are running firmware version 11.004 or below. These modules are essential communication interfaces between ControlLogix programmable automation controllers (PACs) and Ethernet networks in industrial environments.

Potential Impact:

Successful exploitation of this vulnerability enables attackers to perform memory dumps, modify system memory, and control the execution flow of the affected devices. Such access could allow attackers to manipulate industrial processes, access sensitive operational data, or disrupt manufacturing operations. The WDB agent provides low-level system access typically reserved for authorized development and maintenance personnel, making its unauthorized activation particularly concerning.

Mitigation Measures:

Rockwell Automation has released firmware version 12.001 to address this vulnerability across all affected ControlLogix Ethernet modules. Organizations are strongly advised to update to this corrected version as the primary mitigation strategy. The update disables the insecure default configuration of the WDB agent, effectively eliminating the primary attack vector.

For environments where immediate firmware updates are not feasible, Rockwell Automation recommends implementing comprehensive security best practices, including:

– Network Segmentation: Isolate industrial control systems from other networks to limit potential attack vectors.
– Firewall Implementation: Establish proper firewall rules to restrict access to debugging interfaces and other critical system components.
– Continuous Monitoring: Regularly monitor network traffic for suspicious activities that could indicate exploitation attempts.
– Security Assessments: Conduct thorough security assessments of industrial automation infrastructure to identify and address similar vulnerabilities in other systems.

Broader Context:

This vulnerability is part of a series of security issues identified in Rockwell Automation products. For instance, in June 2024, a critical flaw (CVE-2024-6242) was discovered in Rockwell’s ControlLogix and GuardLogix controllers, allowing attackers to bypass security measures and gain unauthorized access to industrial control systems. This flaw enabled attackers to circumvent the trusted slot feature in ControlLogix controllers, potentially leading to unauthorized commands being sent to the PLC CPU, such as downloading logic or modifying user projects and device configurations.

Additionally, in July 2024, multiple vulnerabilities were found in Rockwell Automation’s PanelView Plus devices. These flaws could allow unauthenticated attackers to perform remote code execution and denial-of-service attacks. The critical vulnerability, tracked as CVE-2023-2071, affected FactoryTalk View Machine Edition and had a CVSS score of 9.8.

Industry Response:

The Cybersecurity and Infrastructure Security Agency (CISA) has been actively issuing advisories to address vulnerabilities in industrial control systems. In June 2024, CISA released six advisories detailing vulnerabilities in products from major vendors, including Rockwell Automation. These advisories provided critical information on current security issues, vulnerabilities, and exploits affecting ICS, emphasizing the importance of timely updates and vigilance in cybersecurity practices.

Conclusion:

The discovery of CVE-2025-7353 in Rockwell Automation’s ControlLogix Ethernet modules highlights the ongoing challenges in securing industrial control systems. Organizations utilizing these modules must take immediate action to update firmware and implement recommended security measures to protect against potential exploitation. Continuous monitoring, regular security assessments, and adherence to best practices are essential to safeguard industrial environments from emerging cyber threats.