Skip to main content

CVE-2025-9160: CWE-306: Missing Authentication for Critical Function in Rockwell Automation CompactLogix® 5480

High
VulnerabilityCVE-2025-9160cvecve-2025-9160cwe-306
Published: Tue Sep 09 2025 (09/09/2025, 12:30:45 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: CompactLogix® 5480

Description

A code execution security issue exists in the affected product. An attacker with physical access could abuse the maintenance menu of the controller with a crafted payload. The security issue can result in arbitrary code execution.

AI-Powered Analysis

AILast updated: 09/09/2025, 12:42:32 UTC

Technical Analysis

CVE-2025-9160 is a high-severity vulnerability affecting Rockwell Automation's CompactLogix® 5480 controllers, specifically versions 32 through 37.011 with the Windows package (2.1.0) on Windows 10 version 1607. The vulnerability is categorized under CWE-306, which denotes 'Missing Authentication for Critical Function.' This means that certain critical functions within the device's maintenance menu lack proper authentication controls. An attacker with physical access to the device can exploit this flaw by crafting a malicious payload and injecting it through the maintenance menu, leading to arbitrary code execution on the controller. The CVSS 4.0 vector indicates that the attack requires physical access (AV:P), has low attack complexity (AC:L), requires no privileges (PR:N), no user interaction (UI:N), and results in high confidentiality, integrity, and availability impacts (VC:H, VI:H, VA:H). The scope is unchanged (S:U), and there are no security requirements (SC:N, SI:N, SA:N). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical nature of the affected industrial control system (ICS) device. The CompactLogix® 5480 is widely used in industrial automation environments for controlling manufacturing processes, making this vulnerability particularly concerning for operational technology (OT) security. The lack of authentication on critical functions means that an attacker who gains physical access can bypass security controls and execute arbitrary code, potentially disrupting industrial operations or causing safety hazards.

Potential Impact

For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors, this vulnerability could have severe consequences. The CompactLogix® 5480 controllers are integral to automation and control systems, and arbitrary code execution could lead to unauthorized manipulation of industrial processes, resulting in production downtime, equipment damage, safety incidents, or data breaches. Given the physical access requirement, the threat is more relevant to environments where devices are accessible to personnel or visitors without strict physical security controls. The high impact on confidentiality, integrity, and availability means that exploitation could compromise sensitive operational data, alter control logic, or cause system outages. This could disrupt supply chains, cause financial losses, and potentially endanger human safety. Additionally, regulatory compliance frameworks in Europe, such as NIS2 and GDPR, may impose reporting and remediation obligations if such vulnerabilities are exploited, increasing the operational and legal risks for affected organizations.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement strict physical security controls to prevent unauthorized access to CompactLogix® 5480 controllers, including locked cabinets, surveillance, and access logging. Network segmentation should be enforced to isolate ICS devices from general IT networks, reducing the risk of remote exploitation. Organizations should monitor for unusual activity on maintenance interfaces and restrict maintenance operations to authorized personnel only. Since no patch is currently available, consider deploying compensating controls such as disabling or restricting access to the maintenance menu where feasible. Conduct regular security audits and penetration tests focusing on physical and logical access controls for ICS devices. Additionally, maintain an inventory of affected devices and prepare for rapid patch deployment once Rockwell Automation releases an official fix. Employee training on physical security and insider threat awareness is also critical to reduce the risk of malicious or accidental exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Rockwell
Date Reserved
2025-08-19T12:46:07.058Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c02092b132c07409a3e3c1

Added to database: 9/9/2025, 12:41:54 PM

Last enriched: 9/9/2025, 12:42:32 PM

Last updated: 9/9/2025, 9:12:27 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats