Skip to main content

CVE-2025-8008: CWE-755: Improper Handling of Exceptional Conditions in Rockwell Automation 1756-ENT2R, 1756-EN4TR, 1756-EN4TRXT

High
VulnerabilityCVE-2025-8008cvecve-2025-8008cwe-755
Published: Tue Sep 09 2025 (09/09/2025, 12:27:48 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: 1756-ENT2R, 1756-EN4TR, 1756-EN4TRXT

Description

A security issue exists in the protected mode of EN4TR devices, where sending specifically crafted messages during a Forward Close operation can cause the device to crash.

AI-Powered Analysis

AILast updated: 09/09/2025, 12:42:44 UTC

Technical Analysis

CVE-2025-8008 is a high-severity vulnerability affecting specific Rockwell Automation industrial communication modules: 1756-ENT2R, 1756-EN4TR, and 1756-EN4TRXT, particularly versions 6.001 or prior. These devices are used in industrial control systems (ICS) for Ethernet communication within programmable logic controller (PLC) networks. The vulnerability arises from improper handling of exceptional conditions (CWE-755) in the protected mode of EN4TR devices. Specifically, when a specially crafted message is sent during a Forward Close operation—a communication process used to close established connections—this can cause the device to crash, leading to a denial of service (DoS) condition. The CVSS 4.0 base score is 7.1, indicating high severity, with the vector showing that the attack requires adjacent network access (AV:A), no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The vulnerability impacts the availability of the affected devices by causing them to crash, which can disrupt industrial processes relying on these communication modules. No known exploits are currently in the wild, and no patches have been linked yet, indicating that mitigation may require vendor updates or configuration changes. The vulnerability does not affect confidentiality or integrity directly but poses a significant risk to operational continuity in industrial environments where these devices are deployed.

Potential Impact

For European organizations, especially those operating critical infrastructure, manufacturing plants, or utilities that rely on Rockwell Automation's 1756 series communication modules, this vulnerability presents a substantial risk. A successful exploitation could cause network communication failures between PLCs and control systems, resulting in process interruptions, production downtime, or safety system malfunctions. Given the role of these devices in industrial automation, availability impacts could cascade into broader operational disruptions, financial losses, and potential safety hazards. European industries such as automotive manufacturing, energy production, and chemical processing, which heavily use industrial control systems, could be particularly vulnerable. Additionally, the lack of required authentication and user interaction means that attackers with access to the industrial network segment could exploit this vulnerability remotely, increasing the threat level. Although no exploits are currently known in the wild, the high severity score and ease of exploitation suggest that threat actors may develop attacks targeting this vulnerability, especially in geopolitically sensitive sectors.

Mitigation Recommendations

1. Network Segmentation: Isolate the affected Rockwell Automation devices on dedicated network segments with strict access controls to limit exposure to adjacent network attackers. 2. Access Control Lists (ACLs): Implement ACLs on network devices to restrict traffic to and from the affected modules, allowing only trusted management and control systems to communicate with them. 3. Monitoring and Anomaly Detection: Deploy industrial network monitoring tools to detect unusual Forward Close operations or malformed messages targeting these devices. 4. Vendor Coordination: Engage with Rockwell Automation for official patches or firmware updates addressing CVE-2025-8008 and apply them promptly once available. 5. Incident Response Planning: Prepare response procedures for potential DoS incidents affecting these devices to minimize downtime and restore operations quickly. 6. Configuration Review: Review device configurations to disable or limit Forward Close operations if possible or apply any recommended configuration hardening from the vendor. 7. Physical Security: Ensure physical security controls prevent unauthorized access to network ports connected to these devices, reducing the risk of local exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Rockwell
Date Reserved
2025-07-21T20:01:43.264Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c02092b132c07409a3e3be

Added to database: 9/9/2025, 12:41:54 PM

Last enriched: 9/9/2025, 12:42:44 PM

Last updated: 9/9/2025, 9:12:27 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats