Loading

Micro820®, Micro850®, Micro870® – Specialized Fuzzing Vulnerabilities

Severity:
High
Advisory ID:
SD1766
Date de publication:
December 09, 2025
Date de la dernière mise à jour:
December 09, 2025
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
Non
Corrected:
Oui
Workaround:
Non
CVE IDs
CVE-2025-13823,
CVE-2025-13824
Téléchargements
The following link(s) provide the security advisory in Vulnerability Exploitability Exchange format:
JSON
JSON
Résumé

Micro820®, Micro850®,  Micro870® – Specialized Fuzzing Vulnerabilities

The security of our products is important to us as your industrial automation supplier. This security issue was found internally during routine testing and is being reported based on our commitment to customer transparency and improvement of all business environments.

Product Description

The Rockwell Micro800™ series is a family of compact, cost-effective programmable logic controllers designed for standalone machines, offering scalable control with flexible communication options, plug-in and expansion modules, and easy programming through Connected Components Workbench software.

Affected Products and Solution

Affected Product

CVE

Affected Firmware Version

Corrected in Firmware Version

Affected Catalog Numbers

Micro850/870 (L50E/L70E)

CVE-2025-13823

V23.011

V23.012

2080-L50E-*
2080-L70E-*

Micro850/870 (L50E/L70E)

CVE-2025-13824

V23.011
 and below

V23.012

2080-L50E-*

2080-L70E-*

Micro850/870 (LC50/LC70)

CVE-2025-13824

V12.013 and lower

 

Migrate to the newer Micro850/870 controllers (L50E/L70E V23.012)

2080-LC50-*

2080-LC70-*

Micro820 (LC20)

 

CVE-2025-13824

 

V14.011 and lower

 

Migrate to the newer Micro820 controllers (L20E V23.011)

 

2080-LC20-*

 

Security Issue Details for CVE-2025-13823

Category

Details

CVE ID

CVE-2025-13823

Impact

A security issue was found in the IPv6 stack in the Micro850 and Micro870 controllers when the controllers received multiple malformed packets during fuzzing. The controllers will go into recoverable fault with fault code 0xFE60. To recover the controller, clear the fault.

CVSS 3.1 Base Score

6.5/10

CVSS 4.0 Base Score

7.1/10

CWE

CWE-1395: Dependency on Vulnerable Third-Party Component

Known Exploited Vulnerability

No (Not listed in KEV database)

Security Issue Details for CVE-2025-13824

Category

Details

CVE ID

CVE-2025-13824

Impact

A security issue exists due to improper handling of malformed CIP packets during fuzzing. The controller enters a hard fault with solid red Fault LED and becomes unresponsive. Upon power cycle, the controller will enter recoverable fault where the MS LED and Fault LED become flashing red and reports fault code 0xF019. To recover, clear the fault.

CVSS 3.1 Base Score

7.5/10

CVSS 4.0 Base Score

8.7/10

CWE

CWE-763: Release of Invalid Pointer or Reference

Known Exploited Vulnerability

No (Not listed in KEV database)

Mitigations and Workarounds
For CVE-2025-13823, customers are advised to disable IPv6 functionalities if they do not require this feature. Customers using the affected software, who are not able to upgrade to one of the corrected versions, should use our security best practices. 

Revision History

Revision

Date

Description

1.0

12/15/2025

Initial release

Glossary

·         IPv6: Internet protocol that uses 128-bit addresses to allow more devices to connect and improve network efficiency compared to IPv4

·         Recoverable Fault: an error or failure in a system that can be corrected without stopping or restarting the entire system, allowing normal operation to continue after recovery actions are taken.

·         CIP Packet: data structure used in the Common Industrial Protocol (CIP) to encapsulate information for communication between industrial devices, including commands, responses, and associated parameters for control and data exchange.

Get Up-to-Date Product Security Information

Visit the Rockwell Automation security advisories on the Trust Center page to:

·         Subscribe to product security alerts

·         Review the current list of Rockwell Automation security advisories

·         Report a possible security issue in a Rockwell Automation product

·         Learn more about the vulnerability policy

Support

If you have any questions regarding the security issue(s) above and how to mitigate them, contact TechConnect for help. More information can be found at Contact Us | Rockwell Automation | US.

If you have any questions regarding this disclosure, please contact PSIRT
Email: rasecure@ra.rockwell.com

Legal Disclaimer

ROCKWELL AUTOMATION DOES NOT WARRANT THE COMPLETENESS, TIMELINESS OR ACCURACY OF ANY OF THE DATA CONTAINED IN THIS WEB SITE AND MAY MAKE CHANGES THERETO AT ANY TIME IN ITS SOLE DISCRETION WITHOUT NOTICE. FURTHER, ALL INFORMATION CONVEYED HEREBY IS PROVIDED TO USERS "AS IS." IN NO EVENT SHALL ROCKWELL BE LIABLE FOR ANY DAMAGES OF ANY KIND INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS PROFIT OR DAMAGE, EVEN IF ROCKWELL AUTOMATION HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGES. ROCKWELL AUTOMATION DISCLAIMS ALL WARRANTIES WHETHER EXPRESSED OR IMPLIED IN RESPECT OF THE INFORMATION (INCLUDING SOFTWARE) PROVIDED HEREBY, INCLUDING THE IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, AND NON-INFRINGEMENT. Note that certain jurisdictions do not countenance the exclusion of implied warranties; thus, this disclaimer may not apply to you.

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Accueil Rockwell Automation
  2. Chevron LeftChevron Left Trust Center
  3. Chevron LeftChevron Left Industrial Security Adv
  4. Chevron LeftChevron Left Industrial Security Advisory Detail
Veuillez mettre à jour vos préférences en matière de cookies pour continuer.
Cette fonctionnalité nécessite des cookies pour améliorer votre expérience. Veuillez mettre à jour vos préférences pour autoriser ces cookies:
  • Cookies de réseaux sociaux
  • Cookies fonctionnels
  • Cookies de performances
  • Cookies marketing
  • Tous les cookies
Vous pouvez mettre à jour vos préférences à tout moment. Pour plus d'informations, veuillez consulter notre {0} politique de confidentialité
CloseClose