Loading

Comms - 1783-NATR Multiple Vulnerabilities

Severity:
Critical
Advisory ID:
SD1756
Published Date:
October 14, 2025
Last Updated:
October 14, 2025
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
No
Corrected:
Yes
Workaround:
No
CVE IDs
CVE-2025-7328,
CVE-2025-7329,
CVE-2025-7330
Downloads
The following link(s) provide the security advisory in Vulnerability Exploitability Exchange format:
JSON
JSON
JSON
Summary

The security of our products is important to us as your industrial automation supplier. This security issue was found internally during routine testing and is being reported based on our commitment to customer transparency and improvement of all business environments. 

 

Product Description

 

The 1783-NATR from Rockwell Automation is a configurable NAT (Network Address Translation) router that enables simple 1:1 IP address mapping between machine and control networks.

 

Affected products and solution

 

Affected Product 

CVE 

Affected  Software Version 

Corrected in Software Version 

Affected Catalog Numbers

Comms - 1783-NATR 

CVE-2025-7328

1.006 and prior 

1.007 and later 

 

 

1783-NATR

CVE-2025-7329 

1.006 and prior 

1.007 and later 

CVE-2025-7330 

1.006 and prior 

1.007 and later 

 

Security Issue Details

 

Category

Details

CVE ID

CVE-2025-7328

Impact

Multiple Broken Authentication security issues exist in the affected product. The security issues are due to missing authentication checks on critical functions. These could result in potential denial-of-service, admin account takeover, or NAT rule modifications. Devices would no longer be able to communicate through NATR as a result of denial-of-service or NAT rule modifications. NAT rule modification could also result in device communication to incorrect endpoints. Admin account takeover could allow modification of configuration and require physical access to restore. 

CVSS 3.1 Base Score

10/10

CVSS 4.0 Base Score

9.9/10

CWEs

CWE-306: Missing Authentication for Critical Function

Known Exploited Vulnerability

No (Not listed in KEV database)

 

Category

Details

CVE ID

CVE-2025-7329

Impact

A Stored Cross-Site Scripting security issue exists in the affected product that could potentially allow a malicious user to view and modify sensitive data or make the webpage unavailable. The vulnerability stems from missing special character filtering and encoding. Successful exploitation requires an attacker to be able to update configuration fields behind admin login. 

CVSS 3.1 Base Score

8.4/10

CVSS 4.0 Base Score

8.5/10

CWEs

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Known Exploited Vulnerability

No (Not listed in KEV database)

 

 

Category

Details

CVE ID

CVE-2025-7330

Impact

A cross-site request forgery security issue exists in the product and version listed. The vulnerability stems from missing CSRF checks on the impacted form. This allows for unintended configuration modification if an attacker can convince a logged in admin to visit a crafted link. 

CVSS 3.1 Base Score

8.0/10

CVSS 4.0 Base Score

7.0/10

CWEs

CWE-352: Cross-Site Request Forgery (CSRF)

Known Exploited Vulnerability

No (Not listed in KEV database)

 

 

 

 

 

 

 

 

 

 

 

Mitigations and Workarounds


Customers using the affected software, who are not able to upgrade to one of the corrected versions, should use our security best practices.    

 

Revision History

 

Revision

Date

Description

1.0

October 14, 2025

Initial release

 

 

 

Glossary

·         Known Exploited Vulnerability (KEV) database: an official list of security flaws that attackers have actively exploited

·         NAT (Network Address Translation): A method used to remap IP addresses by modifying network address information in packet headers.

·         Authentication: The process of verifying the identity of a user or system. 

·         Denial-of-Service (DoS): An attack that disrupts the normal functioning of a system, often by overwhelming it with requests.

·         Cross-Site Request Forgery (CSRF): An attack that tricks a user into executing unwanted actions on a web application in which they’re authenticated.

·         Stored Cross-Site Scripting (XSS): A vulnerability where malicious scripts are stored on the server and executed in the browser of users who access the affected content.

·         Broken Authentication: A vulnerability where authentication mechanisms are improperly implemented, allowing unauthorized access or control.

 

 

 

 

 

Get Up-to-Date Product Security Information

 

Visit the Rockwell Automation security advisories on the Trust Center page to:

  • Subscribe to product security alerts
  • Review the current list of Rockwell Automation security advisories
  • Report a possible security issue in a Rockwell Automation product
  • Learn more about the Rockwell Automation vulnerability policy

 

 

Support


If you have any questions regarding the security issue(s) above and how to mitigate them, contact TechConnect for help. More information can be found at Contact Us | Rockwell Automation | US.

 

If you have any questions regarding this disclosure, please contact PSIRT

Email: rasecure@ra.rockwell.com

 

Legal Disclaimer

 

ROCKWELL AUTOMATION DOES NOT WARRANT THE COMPLETENESS, TIMELINESS OR ACCURACY OF ANY OF THE DATA CONTAINED IN THIS WEB SITE AND MAY MAKE CHANGES THERETO AT ANY TIME IN ITS SOLE DISCRETION WITHOUT NOTICE. FURTHER, ALL INFORMATION CONVEYED HEREBY IS PROVIDED TO USERS "AS IS." IN NO EVENT SHALL ROCKWELL BE LIABLE FOR ANY DAMAGES OF ANY KIND INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS PROFIT OR DAMAGE, EVEN IF ROCKWELL AUTOMATION HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGES. ROCKWELL AUTOMATION DISCLAIMS ALL WARRANTIES WHETHER EXPRESSED OR IMPLIED IN RESPECT OF THE INFORMATION (INCLUDING SOFTWARE) PROVIDED HEREBY, INCLUDING THE IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, AND NON-INFRINGEMENT. Note that certain jurisdictions do not countenance the exclusion of implied warranties; thus, this disclaimer may not apply to you.

 

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Rockwell Automation Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Trust Center Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Security Adv Chevron RightChevron Right
  4. Chevron LeftChevron Left Industrial Security Advisory Detail Chevron RightChevron Right
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our {0} Privacy Policy
CloseClose