[CIVN-2025-0216] Remote Code Execution Vulnerability in Rockwell Automations ControlLogix Ethernet modules
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerability in Rockwell Automations ControlLogix Ethernet modules
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
1756-EN2T/D Version 11.004 or prior
1756-EN2F/C Version 11.004 or prior
1756-EN2TR/C Version 11.004 or prior
1756-EN3TR/B Version 11.004 or prior
1756-EN2TP/A Version 11.004 or prior
Overview
A vulnerability has been reported in ControlLogix Ethernet modules which could allow an attacker to perform remote code execution on the targeted system.
Target Audience:
Organizations using Rockwell Automation¿s ControlLogix Ethernet modules in industrial automation environment.
Risk Assessment:
High risk of sensitive data disclosure, altered execution flow and process disruption.
Impact Assessment:
Potential impact on Confidentiality, Integrity and Availability of the System.
Description
The ControlLogix Ethernet Module is a hardware component that connects a ControlLogix PLC to an Ethernet network. It facilitates communication between the PLC and other devices or systems.
This vulnerability exists in ControlLogix Ethernet Module due to the web-based debugger (WDB) agent being enabled by default. A remote attacker could exploit this vulnerability by connecting to WDB agent from a specific IP address which could allow to perform unauthorized memory dumps, modify memory and control the execution flow on the targeted system.
Solution
Upgrade ControlLogix Ethernet Module to version 12.001
https://www.rockwellautomation.com/en-in/trust-center/security-advisories/advisory.SD1732.html
Vendor Information
Rockwell Automation
https://www.rockwellautomation.com/en-in/trust-center/security-advisories/advisory.SD1732.html
References
Rockwell Automation
https://www.rockwellautomation.com/en-in/trust-center/security-advisories/advisory.SD1732.html
CISA
https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-28
CVE Name
CVE-2025-7353
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=3wzX
—–END PGP SIGNATURE—–