Remote code execution flaw reported in Rockwell Automation ControlLogix ethernet modules
Take action: If you have Rockwell ControlLogix Ethernet modules (1756-EN2T/D, 1756-EN2F/C, 1756-EN2TR/C, 1756-EN3TR/B, 1756-EN2TP/A) make sure it's isolated from the internet and accessible only from trusted networks. Then check the firmware version. If it's 11.004 or earlier, plan an update to firmware version 12.001. If an attacker manages to reach the device, they will attack it.
Learn More
Rockwell Automation is reporting a critical security vulnerability affecting multiple ControlLogix Ethernet communication modules that could enable remote attackers to execute arbitrary code on industrial control systems.
The vulnerability is tracked as CVE-2025-7353 (CVSS score 9.8) and is caused by insecure default configuration where a web-based debugger (WDB) agent remains enabled on production devices. When attackers connect to the WDB agent using specific IP addresses, they can perform unauthorized memory operations, including memory dumps, direct memory modification, and manipulation of execution flow control.
The following ControlLogix Ethernet modules running firmware version 11.004 and prior are vulnerable:
- 1756-EN2T/D
- 1756-EN2F/C
- 1756-EN2TR/C
- 1756-EN3TR/B
- 1756-EN2TP/A
Rockwell Automation strongly recommends that ControlLogix Ethernet Module users update to Version 12.001 if possible. Firmware revisions are product- and series-specific, and operators are advised to verify the required revision on the product-specific vendor advisory before upgrading. For environments where immediate patching is not possible, organizations are advised to implement mitigating measures like network segmentation, access control lists, and intrusion detection systems.