1. EXECUTIVE SUMMARY
- CVSS v4 9.3
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: Rockwell Automation
- Equipment: ControlLogix Ethernet Modules
- Vulnerability: Initialization of a Resource with an Insecure Default
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow remote attackers to perform memory dumps, modify memory, and control execution flow.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of Rockwell Automation ControlLogix Ethernet Modules are affected:
- 1756-EN2T/D: Version 11.004 or below
- 1756-EN2F/C: Version 11.004 or below
- 1756-EN2TR/C: Version 11.004 or below
- 1756-EN3TR/B: Version 11.004 or below
- 1756-EN2TP/A: Version 11.004 or below
3.2 VULNERABILITY OVERVIEW
3.2.1 Initialization of a Resource with an Insecure Default CWE-1188
Rockwell Automation ControlLogix Ethernet Modules are vulnerable to a security issue where the web-based debugger agent is enabled by default on released devices. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow.
CVE-2025-7353 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2025-7353. A base score of 9.3 has been calculated; the CVSS vector string is (This article has been indexed from All CISA Advisories