Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7353: CWE-1188: Initialization of a Resource with an Insecure Default in Rockwell Automation 1756-EN2T/D

0
Critical
VulnerabilityCVE-2025-7353cvecve-2025-7353cwe-1188
Published: Thu Aug 14 2025 (08/14/2025, 13:23:26 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: 1756-EN2T/D

Description

A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:15:47 UTC

Technical Analysis

CVE-2025-7353 is a critical security vulnerability affecting Rockwell Automation ControlLogix Ethernet Modules 1756-EN2T/D running firmware version 11.004 or below. The root cause is an insecure default initialization (CWE-1188) of the web-based debugger (WDB) agent, which is enabled by default and listens for connections from a specific IP address. This debugger agent lacks proper authentication and access controls, allowing remote attackers to connect without credentials. Once connected, attackers can perform memory dumps, modify the device's memory, and manipulate execution flow, effectively gaining control over the device's operations. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, making it highly dangerous in industrial environments. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects its critical nature, with high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the exposure of critical industrial control systems to such attacks could lead to severe operational disruptions or safety hazards. The vulnerability underscores the risks of insecure default configurations in industrial control system components.

Potential Impact

The impact of CVE-2025-7353 on organizations worldwide is substantial, particularly for those relying on Rockwell Automation ControlLogix Ethernet Modules in critical industrial control systems (ICS) and operational technology (OT) environments. Exploitation allows attackers to remotely access and manipulate device memory and execution flow without authentication, potentially leading to unauthorized control over industrial processes. This can result in operational downtime, safety incidents, data breaches, and sabotage of critical infrastructure such as manufacturing plants, utilities, and transportation systems. The compromise of these modules could disrupt production lines, cause physical damage to equipment, or endanger human safety. Given the widespread use of Rockwell Automation products in North America, Europe, and parts of Asia, the vulnerability poses a global risk to industrial sectors. The ease of exploitation and high impact on confidentiality, integrity, and availability elevate the threat to critical severity, demanding immediate attention from affected organizations.

Mitigation Recommendations

To mitigate CVE-2025-7353, organizations should take the following specific actions: 1) Immediately identify all Rockwell Automation 1756-EN2T/D modules running firmware version 11.004 or below within their networks. 2) Apply any available firmware updates or patches from Rockwell Automation as soon as they are released; if no patch is currently available, engage with the vendor for guidance and timelines. 3) Disable the web-based debugger (WDB) agent if it is not essential for operations to eliminate the attack surface. 4) Restrict network access to the affected modules by implementing strict network segmentation and firewall rules, allowing only trusted IP addresses and management stations to communicate with these devices. 5) Monitor network traffic for unusual connections to the WDB agent port and implement intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts. 6) Conduct regular security audits and vulnerability assessments of ICS/OT environments to identify insecure default configurations and unauthorized services. 7) Train ICS/OT personnel on the risks of default-enabled debugging services and the importance of secure configuration management. These measures go beyond generic advice by focusing on configuration hardening, network controls, and proactive monitoring specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Rockwell
Date Reserved
2025-07-08T12:24:08.365Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689de581ad5a09ad005b2ae6

Added to database: 8/14/2025, 1:32:49 PM

Last enriched: 2/27/2026, 4:15:47 AM

Last updated: 3/24/2026, 10:48:47 PM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses