CVE-2025-7353
CRITICALRockwell Automation ControlLogix - Memory Corruption
Title source: llmDescription
A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow.
Scores
CVSS v4
9.3
EPSS
0.0081
EPSS Percentile
74.3%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-1188
Status
published
Products (5)
Rockwell Automation/1756-EN2F/C
Version 11.004 or below
Rockwell Automation/1756-EN2T/D
Version 11.004 or below
Rockwell Automation/1756-EN2TP/A
Version 11.004 or below
Rockwell Automation/1756-EN2TR/C
Version 11.004 or below
Rockwell Automation/1756-EN3TR/B
Version 11.004 or below
Published
Aug 14, 2025
Tracked Since
Feb 18, 2026