The security of our products is important to us as your industrial automation supplier. This security issue was found internally during routine testing and is being reported based on our commitment to customer transparency and improvement of all business environments.
Product Description
The 1783-NATR from Rockwell Automation is a configurable NAT (Network Address Translation) router that enables simple 1:1 IP address mapping between machine and control networks.
Affected products and solution
Affected Product |
CVE |
Affected Software Version |
Corrected in Software Version |
Affected Catalog Numbers |
Comms - 1783-NATR |
CVE-2025-7328 |
1.006 and prior |
|
|
CVE-2025-7329 |
1.006 and prior |
|||
CVE-2025-7330 |
1.006 and prior |
Security Issue Details
Category |
Details |
CVE ID |
CVE-2025-7328 |
Impact |
Multiple Broken Authentication security issues exist in the affected product. The security issues are due to missing authentication checks on critical functions. These could result in potential denial-of-service, admin account takeover, or NAT rule modifications. Devices would no longer be able to communicate through NATR as a result of denial-of-service or NAT rule modifications. NAT rule modification could also result in device communication to incorrect endpoints. Admin account takeover could allow modification of configuration and require physical access to restore. |
CVSS 3.1 Base Score |
|
CVSS 4.0 Base Score |
|
CWEs |
|
Known Exploited Vulnerability |
No (Not listed in KEV database) |
Category |
Details |
CVE ID |
CVE-2025-7329 |
Impact |
A Stored Cross-Site Scripting security issue exists in the affected product that could potentially allow a malicious user to view and modify sensitive data or make the webpage unavailable. The vulnerability stems from missing special character filtering and encoding. Successful exploitation requires an attacker to be able to update configuration fields behind admin login. |
CVSS 3.1 Base Score |
|
CVSS 4.0 Base Score |
|
CWEs |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
Known Exploited Vulnerability |
No (Not listed in KEV database) |
Category |
Details |
CVE ID |
CVE-2025-7330 |
Impact |
A cross-site request forgery security issue exists in the product and version listed. The vulnerability stems from missing CSRF checks on the impacted form. This allows for unintended configuration modification if an attacker can convince a logged in admin to visit a crafted link. |
CVSS 3.1 Base Score |
|
CVSS 4.0 Base Score |
|
CWEs |
|
Known Exploited Vulnerability |
No (Not listed in KEV database) |
Mitigations and Workarounds
Customers using the affected software, who are not able to upgrade to one of the corrected versions, should use our security best practices.
Revision History
Revision |
Date |
Description |
1.0 |
October 14, 2025 |
Initial release |
Glossary
· Known Exploited Vulnerability (KEV) database: an official list of security flaws that attackers have actively exploited
· NAT (Network Address Translation): A method used to remap IP addresses by modifying network address information in packet headers.
· Authentication: The process of verifying the identity of a user or system.
· Denial-of-Service (DoS): An attack that disrupts the normal functioning of a system, often by overwhelming it with requests.
· Cross-Site Request Forgery (CSRF): An attack that tricks a user into executing unwanted actions on a web application in which they’re authenticated.
· Stored Cross-Site Scripting (XSS): A vulnerability where malicious scripts are stored on the server and executed in the browser of users who access the affected content.
· Broken Authentication: A vulnerability where authentication mechanisms are improperly implemented, allowing unauthorized access or control.
Get Up-to-Date Product Security Information
Visit the Rockwell Automation security advisories on the Trust Center page to:
- Subscribe to product security alerts
- Review the current list of Rockwell Automation security advisories
- Report a possible security issue in a Rockwell Automation product
- Learn more about the Rockwell Automation vulnerability policy
Support
If you have any questions regarding the security issue(s) above and how to mitigate them, contact TechConnect for help. More information can be found at Contact Us | Rockwell Automation | US.
If you have any questions regarding this disclosure, please contact PSIRT
Email: rasecure@ra.rockwell.com
Legal Disclaimer
ROCKWELL AUTOMATION DOES NOT WARRANT THE COMPLETENESS, TIMELINESS OR ACCURACY OF ANY OF THE DATA CONTAINED IN THIS WEB SITE AND MAY MAKE CHANGES THERETO AT ANY TIME IN ITS SOLE DISCRETION WITHOUT NOTICE. FURTHER, ALL INFORMATION CONVEYED HEREBY IS PROVIDED TO USERS "AS IS." IN NO EVENT SHALL ROCKWELL BE LIABLE FOR ANY DAMAGES OF ANY KIND INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS PROFIT OR DAMAGE, EVEN IF ROCKWELL AUTOMATION HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGES. ROCKWELL AUTOMATION DISCLAIMS ALL WARRANTIES WHETHER EXPRESSED OR IMPLIED IN RESPECT OF THE INFORMATION (INCLUDING SOFTWARE) PROVIDED HEREBY, INCLUDING THE IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, AND NON-INFRINGEMENT. Note that certain jurisdictions do not countenance the exclusion of implied warranties; thus, this disclaimer may not apply to you.