CVE-2025-7353
Rockwell Automation ControlLogix® Ethernet Remote Code Execution Vulnerability
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow.
| CWE | CWE-1188 |
| Vendor | rockwell automation |
| Product | 1756-en2t/d |
| Published | Aug 14, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for rockwell automation 1756-en2t/d
Be the first to know when new unknown vulnerabilities affecting rockwell automation 1756-en2t/d are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
Rockwell Automation / 1756-EN2T/D
Version 11.004 or below
Rockwell Automation / 1756-EN2F/C
Version 11.004 or below
Rockwell Automation / 1756-EN2TR/C
Version 11.004 or below
Rockwell Automation / 1756-EN3TR/B
Version 11.004 or below
Rockwell Automation / 1756-EN2TP/A
Version 11.004 or below