Security Issue in Rockwell Automation Controller Due to Improper CIP Packet Handling
CVE-2025-13824

8.7HIGH

What is CVE-2025-13824?

A security concern arises from the improper handling of malformed CIP packets during fuzz testing in Rockwell Automation's controllers. When such malformed packets are received, the controller may enter a hard fault state, indicated by a solid red Fault LED, rendering it unresponsive. To restore functionality, a power cycle is required, after which the controller may still display a recoverable fault with the MS LED and Fault LED flashing red, accompanied by fault code 0xF019. Users must clear the fault to recover the system's normal operation.

Affected Version(s)

Micro820®, Micro850®, Micro870® V23.011 and below

Micro820®, Micro850®, Micro870® V12.013 and lower

Micro820®, Micro850®, Micro870® V14.011 and lower

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-13824 : Security Issue in Rockwell Automation Controller Due to Improper CIP Packet Handling