CVE-2025-9160: CWE-306: Missing Authentication for Critical Function in Rockwell Automation CompactLogix® 5480
A code execution security issue exists in the affected product. An attacker with physical access could abuse the maintenance menu of the controller with a crafted payload. The security issue can result in arbitrary code execution.
AI Analysis
Technical Summary
CVE-2025-9160 is a high-severity vulnerability affecting Rockwell Automation's CompactLogix® 5480 controllers, specifically versions 32 through 37.011 with the Windows package (2.1.0) on Windows 10 version 1607. The vulnerability is categorized under CWE-306, which denotes 'Missing Authentication for Critical Function.' This means that certain critical functions within the device's maintenance menu lack proper authentication controls. An attacker with physical access to the device can exploit this flaw by crafting a malicious payload and injecting it through the maintenance menu, leading to arbitrary code execution on the controller. The CVSS 4.0 vector indicates that the attack requires physical access (AV:P), has low attack complexity (AC:L), requires no privileges (PR:N), no user interaction (UI:N), and results in high confidentiality, integrity, and availability impacts (VC:H, VI:H, VA:H). The scope is unchanged (S:U), and there are no security requirements (SC:N, SI:N, SA:N). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical nature of the affected industrial control system (ICS) device. The CompactLogix® 5480 is widely used in industrial automation environments for controlling manufacturing processes, making this vulnerability particularly concerning for operational technology (OT) security. The lack of authentication on critical functions means that an attacker who gains physical access can bypass security controls and execute arbitrary code, potentially disrupting industrial operations or causing safety hazards.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors, this vulnerability could have severe consequences. The CompactLogix® 5480 controllers are integral to automation and control systems, and arbitrary code execution could lead to unauthorized manipulation of industrial processes, resulting in production downtime, equipment damage, safety incidents, or data breaches. Given the physical access requirement, the threat is more relevant to environments where devices are accessible to personnel or visitors without strict physical security controls. The high impact on confidentiality, integrity, and availability means that exploitation could compromise sensitive operational data, alter control logic, or cause system outages. This could disrupt supply chains, cause financial losses, and potentially endanger human safety. Additionally, regulatory compliance frameworks in Europe, such as NIS2 and GDPR, may impose reporting and remediation obligations if such vulnerabilities are exploited, increasing the operational and legal risks for affected organizations.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement strict physical security controls to prevent unauthorized access to CompactLogix® 5480 controllers, including locked cabinets, surveillance, and access logging. Network segmentation should be enforced to isolate ICS devices from general IT networks, reducing the risk of remote exploitation. Organizations should monitor for unusual activity on maintenance interfaces and restrict maintenance operations to authorized personnel only. Since no patch is currently available, consider deploying compensating controls such as disabling or restricting access to the maintenance menu where feasible. Conduct regular security audits and penetration tests focusing on physical and logical access controls for ICS devices. Additionally, maintain an inventory of affected devices and prepare for rapid patch deployment once Rockwell Automation releases an official fix. Employee training on physical security and insider threat awareness is also critical to reduce the risk of malicious or accidental exploitation.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Czech Republic
CVE-2025-9160: CWE-306: Missing Authentication for Critical Function in Rockwell Automation CompactLogix® 5480
Description
A code execution security issue exists in the affected product. An attacker with physical access could abuse the maintenance menu of the controller with a crafted payload. The security issue can result in arbitrary code execution.
AI-Powered Analysis
Technical Analysis
CVE-2025-9160 is a high-severity vulnerability affecting Rockwell Automation's CompactLogix® 5480 controllers, specifically versions 32 through 37.011 with the Windows package (2.1.0) on Windows 10 version 1607. The vulnerability is categorized under CWE-306, which denotes 'Missing Authentication for Critical Function.' This means that certain critical functions within the device's maintenance menu lack proper authentication controls. An attacker with physical access to the device can exploit this flaw by crafting a malicious payload and injecting it through the maintenance menu, leading to arbitrary code execution on the controller. The CVSS 4.0 vector indicates that the attack requires physical access (AV:P), has low attack complexity (AC:L), requires no privileges (PR:N), no user interaction (UI:N), and results in high confidentiality, integrity, and availability impacts (VC:H, VI:H, VA:H). The scope is unchanged (S:U), and there are no security requirements (SC:N, SI:N, SA:N). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical nature of the affected industrial control system (ICS) device. The CompactLogix® 5480 is widely used in industrial automation environments for controlling manufacturing processes, making this vulnerability particularly concerning for operational technology (OT) security. The lack of authentication on critical functions means that an attacker who gains physical access can bypass security controls and execute arbitrary code, potentially disrupting industrial operations or causing safety hazards.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors, this vulnerability could have severe consequences. The CompactLogix® 5480 controllers are integral to automation and control systems, and arbitrary code execution could lead to unauthorized manipulation of industrial processes, resulting in production downtime, equipment damage, safety incidents, or data breaches. Given the physical access requirement, the threat is more relevant to environments where devices are accessible to personnel or visitors without strict physical security controls. The high impact on confidentiality, integrity, and availability means that exploitation could compromise sensitive operational data, alter control logic, or cause system outages. This could disrupt supply chains, cause financial losses, and potentially endanger human safety. Additionally, regulatory compliance frameworks in Europe, such as NIS2 and GDPR, may impose reporting and remediation obligations if such vulnerabilities are exploited, increasing the operational and legal risks for affected organizations.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement strict physical security controls to prevent unauthorized access to CompactLogix® 5480 controllers, including locked cabinets, surveillance, and access logging. Network segmentation should be enforced to isolate ICS devices from general IT networks, reducing the risk of remote exploitation. Organizations should monitor for unusual activity on maintenance interfaces and restrict maintenance operations to authorized personnel only. Since no patch is currently available, consider deploying compensating controls such as disabling or restricting access to the maintenance menu where feasible. Conduct regular security audits and penetration tests focusing on physical and logical access controls for ICS devices. Additionally, maintain an inventory of affected devices and prepare for rapid patch deployment once Rockwell Automation releases an official fix. Employee training on physical security and insider threat awareness is also critical to reduce the risk of malicious or accidental exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Rockwell
- Date Reserved
- 2025-08-19T12:46:07.058Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c02092b132c07409a3e3c1
Added to database: 9/9/2025, 12:41:54 PM
Last enriched: 9/9/2025, 12:42:32 PM
Last updated: 10/29/2025, 4:30:51 PM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12148: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in floragunn Search Guard FLX
MediumCVE-2024-14012: CWE-426 Untrusted Search Path in Revenera InstallShield
HighCVE-2025-60542: n/a
HighCVE-2025-60898: n/a
UnknownCVE-2025-12147: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in floragunn Search Guard FLX
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.