Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13824: CWE-763: Release of Invalid Pointer or Reference in Rockwell Automation Micro820®, Micro850®, Micro870®

0
High
VulnerabilityCVE-2025-13824cvecve-2025-13824cwe-763
Published: Mon Dec 15 2025 (12/15/2025, 15:20:52 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: Micro820®, Micro850®, Micro870®

Description

A security issue exists due to improper handling of malformed CIP packets during fuzzing. The controller enters a hard fault with solid red Fault LED and becomes unresponsive. Upon power cycle, the controller will enter recoverable fault where the MS LED and Fault LED become flashing red and reports fault code 0xF019. To recover, clear the fault.

AI-Powered Analysis

AILast updated: 12/22/2025, 15:54:39 UTC

Technical Analysis

CVE-2025-13824 is a vulnerability classified under CWE-763 (Release of Invalid Pointer or Reference) affecting Rockwell Automation's Micro820®, Micro850®, and Micro870® programmable logic controllers (PLCs). The flaw stems from improper handling of malformed Common Industrial Protocol (CIP) packets during fuzzing activities. When such malformed packets are received, the controller experiences a hard fault, indicated by a solid red Fault LED, rendering the device unresponsive. Upon power cycling, the device transitions into a recoverable fault state, where both the MS LED and Fault LED flash red and the controller reports fault code 0xF019. Recovery requires manual clearing of the fault condition. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting high severity due to its network attack vector (AV:N), low attack complexity (AC:L), and no requirement for authentication or user interaction. The impact is primarily a denial-of-service (DoS) condition that disrupts controller availability, potentially halting industrial processes controlled by these devices. No patches or firmware updates are currently linked, and no known exploits have been reported in the wild. The vulnerability highlights risks in industrial control systems (ICS) where malformed network traffic can cause critical hardware faults, emphasizing the need for robust input validation and network security controls in ICS environments.

Potential Impact

The primary impact of CVE-2025-13824 is a denial-of-service condition on Rockwell Automation Micro820®, Micro850®, and Micro870® controllers, which are widely used in industrial automation and critical infrastructure sectors. For European organizations, this can translate into operational disruptions in manufacturing plants, utilities, and process control environments, potentially causing production downtime and safety risks. The fault state requires manual intervention to clear, increasing operational costs and downtime. Given the controllers' role in automation, prolonged unavailability could impact supply chains and critical services. The lack of authentication or user interaction for exploitation means attackers can remotely induce faults if they gain network access, increasing the threat surface. Although no known exploits exist yet, the vulnerability's high CVSS score and ease of exploitation make it a significant risk for European industrial operators relying on these devices.

Mitigation Recommendations

1. Monitor Rockwell Automation's advisories closely for firmware updates or patches addressing CVE-2025-13824 and apply them promptly once available. 2. Implement strict network segmentation and access controls to isolate industrial control networks from general IT networks and the internet, minimizing exposure to malformed CIP packets. 3. Deploy intrusion detection/prevention systems (IDS/IPS) capable of identifying and blocking malformed CIP traffic patterns to prevent exploitation attempts. 4. Conduct regular network traffic analysis to detect anomalies or fuzzing attempts targeting CIP protocols. 5. Establish incident response procedures for rapid fault clearing and recovery to minimize downtime if exploitation occurs. 6. Train operational technology (OT) personnel to recognize fault indicators such as the red Fault LED and fault code 0xF019 for timely response. 7. Limit network access to trusted devices and users only, using strong authentication and encryption where possible to reduce attack vectors. 8. Consider implementing CIP protocol filtering or validation at network boundaries to reject malformed packets before reaching controllers.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2025-12-01T14:29:33.649Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69402985d9bcdf3f3de49055

Added to database: 12/15/2025, 3:30:13 PM

Last enriched: 12/22/2025, 3:54:39 PM

Last updated: 2/7/2026, 4:09:26 AM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats