Rockwell Automation patches critical VMware components in Rockwell Automation Lifecycle Services
Take action: If you have Rockwell Automation systems running on VMware (IDC, VVA, TDMS, etc.), contact Rockwell immediately if you have a managed services contract, or plan to apply the latest VMware/Broadcom security patches yourself if you don't. These vulnerabilities require local system access to exploit, so be very careful what you load as images on the Rockwell system. Make sure the system is isolated to trusted networks only and restrict physical and remote access to authorized personnel only.
Learn More
CISA is reporting multiple critical security vulnerabilities affecting Rockwell Automation's Lifecycle Services with VMware.
These vulnerabilities are originally reported as VMware vulnerabilities through offensive research at the Pwn2Own 2025 competition.
Vulnerability summary:
- CVE-2025-41236 (CVSS score: 9.4) - Out-of-bounds Write in VMXNET3 virtual network adapter
- CVE-2025-41237 (CVSS score: 9.4) - Out-of-bounds Write in Virtual Machine Communication Interface
- CVE-2025-41238 (CVSS score: 9.4) - Out-of-bounds Write in Paravirtualized SCSI controller
- CVE-2025-41239 (CVSS score: 8.2) - Use of Uninitialized Resource in vSockets
Affected versions:
- All generations of Industrial Data Center (IDC) with VMware (Generations 1-4)
- both Series A and B of VersaVirtual Appliance (VVA) with VMware
- all versions of Threat Detection Managed Services (TDMS) with VMware
- all versions of Endpoint Protection Service with Rockwell Automation Proxy and VMware,
- all Engineered and Integrated Solutions with VMware are affected by these security flaws.
The remediation approach varies based on customer service contracts with Rockwell Automation. For organizations with active Rockwell Automation Infrastructure Managed Service contracts or Threat Detection Managed Service contracts, the company will directly contact impacted users to discuss remediation efforts. Organizations without managed services contracts are directed to refer to Broadcom's security advisories and apply updates to VMware ESXi, including patches available in versions 8.0u3f, 8.0u2e, and 7.0u3w.