Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14027: CWE-401 Missing Release of Memory after Effective Lifetime in Rockwell Automation ControlLogix® Redundancy Enhanced Module

0
High
VulnerabilityCVE-2025-14027cvecve-2025-14027cwe-401
Published: Tue Jan 20 2026 (01/20/2026, 13:56:43 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: ControlLogix® Redundancy Enhanced Module

Description

Multiple denial-of-service vulnerabilities exist in the affected product. These issues can be triggered through various crafted inputs, including malformed Class 3 messages, memory leak conditions, and other resource exhaustion scenarios. Exploitation may cause the device to become unresponsive and, in some cases, result in a major nonrecoverable fault. Recovery may require a restart.

AI-Powered Analysis

AILast updated: 01/20/2026, 14:37:06 UTC

Technical Analysis

CVE-2025-14027 identifies multiple denial-of-service (DoS) vulnerabilities in the Rockwell Automation ControlLogix® Redundancy Enhanced Module, a key component used in industrial control systems (ICS) for redundancy and high availability. The root cause is a memory leak condition classified under CWE-401, where allocated memory is not properly released after its effective lifetime. This leads to resource exhaustion when the device processes certain crafted inputs, including malformed Class 3 messages, which are part of the CIP (Common Industrial Protocol) used in industrial networks. The memory leak and resource exhaustion can cause the module to become unresponsive or enter a major nonrecoverable fault state, disrupting industrial processes. Recovery from such faults typically requires a manual restart, which can cause downtime and operational impact. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, and high impact on availability. No patches have been released yet, and no exploits are known in the wild, but the vulnerability affects all versions of the product, making all deployments potentially vulnerable.

Potential Impact

For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that rely on Rockwell Automation ControlLogix® modules, this vulnerability poses a significant risk of operational disruption. A successful exploitation could lead to denial of service, causing production halts, safety system failures, or loss of redundancy in critical control systems. The need for manual restarts to recover can increase downtime and maintenance costs. Given the widespread use of Rockwell Automation products in Europe’s industrial base, the impact could extend to supply chain interruptions and economic consequences. Additionally, the vulnerability could be leveraged as part of a broader attack campaign targeting industrial environments, potentially affecting national infrastructure resilience.

Mitigation Recommendations

Organizations should immediately implement network segmentation to isolate ControlLogix® modules from untrusted networks, limiting exposure to crafted malicious inputs. Deploy strict input validation and anomaly detection on industrial network traffic to identify and block malformed Class 3 messages or unusual resource consumption patterns. Monitor device logs and network behavior for signs of memory leaks or resource exhaustion. Engage with Rockwell Automation for timely updates and patches once available, and plan for scheduled maintenance windows to apply fixes. Consider deploying redundant systems or failover mechanisms to maintain operational continuity during potential disruptions. Additionally, restrict network access to these modules using firewalls and VPNs, and implement strict access control policies to minimize attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2025-12-04T14:14:42.205Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696f8f574623b1157c38994b

Added to database: 1/20/2026, 2:21:11 PM

Last enriched: 1/20/2026, 2:37:06 PM

Last updated: 2/7/2026, 2:57:57 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats