Metrics
Affected Vendors & Products
Thu, 14 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 14 Aug 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security issue exists within the 5032 16pt Digital Configurable module’s web server. The web server’s session number increments at an interval that correlates to the last two consecutive sign in session interval, making it predictable. | A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow. |
Title | ArmorBlock 5000 I/O – Web Server Vulnerabilities | Rockwell Automation ControlLogix® Ethernet Remote Code Execution Vulnerability |
Weaknesses | CWE-863 | CWE-1188 |
References | ||
Metrics |
cvssV4_0
|
cvssV4_0
|
Thu, 14 Aug 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow. | A security issue exists within the 5032 16pt Digital Configurable module’s web server. The web server’s session number increments at an interval that correlates to the last two consecutive sign in session interval, making it predictable. |
Title | Rockwell Automation ControlLogix® Ethernet Remote Code Execution Vulnerability | ArmorBlock 5000 I/O – Web Server Vulnerabilities |
Weaknesses | CWE-1188 | CWE-863 |
References | ||
Metrics |
cvssV4_0
|
cvssV4_0
|
Thu, 14 Aug 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow. | |
Title | Rockwell Automation ControlLogix® Ethernet Remote Code Execution Vulnerability | |
Weaknesses | CWE-1188 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Rockwell
Published: 2025-08-14T13:23:26.940Z
Updated: 2025-08-15T03:55:58.371Z
Reserved: 2025-07-08T12:24:08.365Z
Link: CVE-2025-7353

Updated: 2025-08-14T13:33:51.359Z

Status : Awaiting Analysis
Published: 2025-08-14T14:15:35.137
Modified: 2025-08-15T13:13:07.817
Link: CVE-2025-7353

No data.