A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow.
History

Thu, 14 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 Aug 2025 14:00:00 +0000

Type Values Removed Values Added
Description A security issue exists within the 5032 16pt Digital Configurable module’s web server. The web server’s session number increments at an interval that correlates to the last two consecutive sign in session interval, making it predictable. A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow.
Title ArmorBlock 5000 I/O – Web Server Vulnerabilities Rockwell Automation ControlLogix® Ethernet Remote Code Execution Vulnerability
Weaknesses CWE-863 CWE-1188
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Thu, 14 Aug 2025 13:45:00 +0000

Type Values Removed Values Added
Description A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow. A security issue exists within the 5032 16pt Digital Configurable module’s web server. The web server’s session number increments at an interval that correlates to the last two consecutive sign in session interval, making it predictable.
Title Rockwell Automation ControlLogix® Ethernet Remote Code Execution Vulnerability ArmorBlock 5000 I/O – Web Server Vulnerabilities
Weaknesses CWE-1188 CWE-863
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N'}


Thu, 14 Aug 2025 13:30:00 +0000

Type Values Removed Values Added
Description A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow.
Title Rockwell Automation ControlLogix® Ethernet Remote Code Execution Vulnerability
Weaknesses CWE-1188
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published: 2025-08-14T13:23:26.940Z

Updated: 2025-08-15T03:55:58.371Z

Reserved: 2025-07-08T12:24:08.365Z

Link: CVE-2025-7353

cve-icon Vulnrichment

Updated: 2025-08-14T13:33:51.359Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-14T14:15:35.137

Modified: 2025-08-15T13:13:07.817

Link: CVE-2025-7353

cve-icon Redhat

No data.