Loading

1715 EtherNet/IP Comms Module Denial-Of-Service Vulnerabilities

Severity:
High
Advisory ID:
SD1757
Fecha de publicación:
October 14, 2025
Última actualización:
October 14, 2025
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
No
Corrected:
Sí
Workaround:
No
CVE IDs
CVE-2025-9177,
CVE-2025-9178
Descargas
The following link(s) provide the security advisory in Vulnerability Exploitability Exchange format:
JSON
JSON
Resumen

The security of our products is important to us as your industrial automation supplier. This security issue was found internally during routine testing and is being reported based on our commitment to customer transparency and improvement of all business environments. 

 

Product Description

 

The 1715 EtherNet/IP Communications Module is a fault-tolerant adapter designed for high-availability applications, enabling redundant I/O communication over EtherNet/IP.

 

Affected products and solution

 

Affected Product 

CVE 

Affected  Software Version 

Corrected in Software Version 

Affected Catalog Numbers

1715-AENTR EtherNet/IP Adapter 

CVE-2025-9177 

Version 3.003 and prior 

Version 3.011 and later

 

   1715-AENTR

CVE-2025-9178 

Version 3.003 and prior 

Version 3.011 and later

 

Security Issue Details

 

Category

Details

CVE ID

CVE-2025-9177

Impact

A denial-of-service security issue exists in the affected product and version. The security issue stems from a high number of requests sent to the web server. This could result in a web server crash however; this does not impact I/O control or communication . A power cycle is required to recover and utilize the webpage.

CVSS 3.1 Base Score

7.5/10

CVSS 4.0 Base Score

7.7/10

CWEs

CWE-770: Allocation of Resources Without Limits or Throttling

Known Exploited Vulnerability

No (Not listed in KEV database)

 

 

 

 

 

Category

Details

CVE ID

CVE-2025-9178

Impact

A denial-of-service security issue exists in the affected product and version. The security issue is caused through CIP communication using crafted payloads. The security issue could result in no CIP communication with 1715 EtherNet/IP Adapter.A restart is required to recover. 

CVSS 3.1 Base Score

7.5/10

CVSS 4.0 Base Score

7.7/10

CWEs

CWE-787: Out-of-bounds Write

Known Exploited Vulnerability

No (Not listed in KEV database)

 

 

 

 

 

Mitigations and Workarounds


Customers using the affected software, who are not able to upgrade to one of the corrected versions, should use our security best practices.    

 

Revision History

 

Revision

Date

Description

1.0

 October 14, 2025

Initial release

 

 

 

Glossary  

·         Known Exploited Vulnerability (KEV) database: an official list of security flaws that attackers have actively exploited  

·         CIP Communication: Common Industrial Protocol (CIP) is a common communication standard that is widely used in industrial automation. Comprises a series of protocols for communication between different devices and systems in automation technology

·         Denial-of-Service (DoS): An attack that disrupts the normal functioning of a system, often by overwhelming it with requests.  

·         Web Server: Is a software and hardware system that serves content over the internet using the Hypertext Transfer Protocol (HTTP) or its secure version HTTPS. Its primary role is to store, process, and deliver webpages to users' browsers upon request.

 

 

Get Up-to-Date Product Security Information

 

Visit the Rockwell Automation security advisories on the Trust Center page to:

  • Subscribe to product security alerts
  • Review the current list of Rockwell Automation security advisories
  • Report a possible security issue in a Rockwell Automation product
  • Learn more about the Rockwell Automation vulnerability policy

 

 

Support


If you have any questions regarding the security issue(s) above and how to mitigate them, contact TechConnect for help. More information can be found at Contact Us | Rockwell Automation | US.

 

If you have any questions regarding this disclosure, please contact PSIRT

Email: rasecure@ra.rockwell.com

 

Legal Disclaimer

 

ROCKWELL AUTOMATION DOES NOT WARRANT THE COMPLETENESS, TIMELINESS OR ACCURACY OF ANY OF THE DATA CONTAINED IN THIS WEB SITE AND MAY MAKE CHANGES THERETO AT ANY TIME IN ITS SOLE DISCRETION WITHOUT NOTICE. FURTHER, ALL INFORMATION CONVEYED HEREBY IS PROVIDED TO USERS "AS IS." IN NO EVENT SHALL ROCKWELL BE LIABLE FOR ANY DAMAGES OF ANY KIND INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS PROFIT OR DAMAGE, EVEN IF ROCKWELL AUTOMATION HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGES. ROCKWELL AUTOMATION DISCLAIMS ALL WARRANTIES WHETHER EXPRESSED OR IMPLIED IN RESPECT OF THE INFORMATION (INCLUDING SOFTWARE) PROVIDED HEREBY, INCLUDING THE IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, AND NON-INFRINGEMENT. Note that certain jurisdictions do not countenance the exclusion of implied warranties; thus, this disclaimer may not apply to you.

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Página principal de Rockwell Automation Chevron RightChevron Right
  2. Chevron LeftChevron Left Trust Center Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Security Adv Chevron RightChevron Right
  4. Chevron LeftChevron Left Industrial Security Advisory Detail Chevron RightChevron Right
Actualice sus preferencias de cookies para continuar.
Esta función requiere cookies para mejorar su experiencia. Actualice sus preferencias para permitir estas cookies.:
  • Cookies de Redes Sociales
  • Cookies Funcionales
  • Cookies de Performance
  • Cookies de Marketing
  • Todas las cookies
Puede actualizar sus preferencias en cualquier momento. Para más información, vea nuestro {0} Política de Privacidad
CloseClose