CVE-2025-7353

CRITICAL

Rockwell Automation ControlLogix - Memory Corruption

Title source: llm
STIX 2.1

Description

A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow.

Scores

CVSS v4 9.3
EPSS 0.0081
EPSS Percentile 74.3%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-1188
Status published
Products (5)
Rockwell Automation/1756-EN2F/C Version 11.004 or below
Rockwell Automation/1756-EN2T/D Version 11.004 or below
Rockwell Automation/1756-EN2TP/A Version 11.004 or below
Rockwell Automation/1756-EN2TR/C Version 11.004 or below
Rockwell Automation/1756-EN3TR/B Version 11.004 or below
Published Aug 14, 2025
Tracked Since Feb 18, 2026