Remote Code Execution Vulnerability in Rockwell Automation ControlLogix Modules
CVE-2025-7353
Key Information:
- Vendor
Rockwell Automation
- Vendor
- CVE Published:
- 14 August 2025
What is CVE-2025-7353?
CVE-2025-7353 is a remote code execution vulnerability that affects the Rockwell Automation ControlLogix Ethernet Modules. These modules are integral to industrial automation and control systems, enabling organizations to manage and monitor production processes effectively. The vulnerability arises from the web-based debugger agent that is enabled on these modules. If an attacker can connect to the debugger agent using a specific IP address, they can gain access to critical features, such as performing memory dumps, altering memory contents, and manipulating the execution flow of applications. This can have detrimental effects on operations by allowing unauthorized control over automation processes, potentially leading to disruptions in service and safety risks.
Potential impact of CVE-2025-7353
-
Unauthorized Access and Control: The vulnerability enables attackers to gain unauthorized access to the ControlLogix modules, allowing them to take over critical automation processes, potentially leading to operational disruptions or safety hazards.
-
Data Integrity Compromise: With the ability to modify memory and control execution flow, attackers can manipulate data and processes within the control systems, leading to data integrity issues that could affect production outcomes and reliability.
-
Increased Attack Surface: The existence of this vulnerability increases the attack surface for organizations using Rockwell Automation products, making them attractive targets for malicious actors, which could lead to further exploitation and broader system compromises.
Affected Version(s)
1756-EN2F/C Version 11.004 or below
1756-EN2T/D Version 11.004 or below
1756-EN2TP/A Version 11.004 or below