Loading

1756-ENT2R, EN4TR, EN4TRXT - Multiple Vulnerabilities

Severity:
High
Advisory ID:
SD1739
發佈日期:
August 13, 2025
最近更新:
August 13, 2025
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
否
Corrected:
是
Workaround:
否
CVE IDs
CVE-2025-8007 ,
CVE-2025-8008
下載
The following link(s) provide the security advisory in Vulnerability Exploitability Exchange format:
JSON
JSON
摘要

1756-ENT2R, EN4TR, EN4TRXT - Multiple Vulnerabilities

 

The security of our products is important to us as your chosen industrial automation supplier. This anomaly was found internally during routine testing and is being reported based on our commitment to customer transparency and to improve their business or production environments.

 

Product Description

 

The 1756-ENT2R, 1756-EN4TR, and 1756-EN4TRXT are high-performance ControlLogix EtherNet/IP communication modules that support advanced topologies like Device Level Ring and Parallel Redundancy Protocol, with scalable connection capacities and environmental ratings to meet standard, high-demand, and extreme industrial networking needs.

 

Affected products and solution

 

Affected Product

CVE

Affected  Software Version

Corrected in Software Version

Affected Catalog Numbers

1756-ENT2R

1756-EN4TR

1756-EN4TRXT

CVE-2025-8007

Version 6.001 or Prior

Version 7.001 or later

1756*

1756-ENT2R

1756-EN4TR

1756-EN4TRXT

CVE-2025-8008

Version 6.001 or Prior

Version 7.001 or later

1756*

 

 

Security Issue Details

 

Category

Details

CVE ID

CVE-2025-8007

Impact

A security issue exists in the protected mode of 1756-EN4TR and 1756-EN2TR communication modules, where a Concurrent Forward Close operation can trigger a Major Non-Recoverable (MNFR) fault. This condition may lead to unexpected system crashes and loss of device availability.

CVSS 3.1 Base Score

6.5/10

CVSS 4.0 Base Score

7.1/10

CWEs

CWE-20: Improper Input Validation

Known Exploited Vulnerability

No (Not listed in KEV database)

 

 

Category

Details

CVE ID

CVE-2025-8008

Impact

A security issue exists in the protected mode of EN4TR devices, where sending specifically crafted messages during a Forward Close operation can cause the device to crash.

CVSS 3.1 Base Score

6.5/10

CVSS 4.0 Base Score

7.1/10

CWEs

CWE-755: Improper Handling of Exceptional Conditions

Known Exploited Vulnerability

No (Not listed in KEV database)

 

 Glossary:

·         Major Non-Recoverable: critical fault condition within industrial control systems

 

 

 

Mitigations and Workarounds

Customers using the affected software, who are not able to upgrade to one of the corrected versions, should use our security best practices.   

 

Revision History

 

Revision

Date

Description

1.0

 September 9, 2025

Initial release

 

 

 

 

 

Get Up-to-Date Product Security Information

 

Visit the Rockwell Automation security advisories on the Trust Center page to:

·         Subscribe to product security alerts

·         Review the current list of Rockwell Automation security advisories

·         Report a possible security issue in a Rockwell Automation product

·         Learn more about the Rockwell Automation vulnerability policy

 

 

Support

If you have any questions regarding the security issue(s) above and how to mitigate them, contact TechConnect for help. More information can be found at Contact Us | Rockwell Automation | US.

 

If you have any questions regarding this disclosure, please contact PSIRT

Email: rasecure@ra.rockwell.com

 

Legal Disclaimer

 

ROCKWELL AUTOMATION DOES NOT WARRANT THE COMPLETENESS, TIMELINESS OR ACCURACY OF ANY OF THE DATA CONTAINED IN THIS WEB SITE AND MAY MAKE CHANGES THERETO AT ANY TIME IN ITS SOLE DISCRETION WITHOUT NOTICE. FURTHER, ALL INFORMATION CONVEYED HEREBY IS PROVIDED TO USERS "AS IS." IN NO EVENT SHALL ROCKWELL BE LIABLE FOR ANY DAMAGES OF ANY KIND INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS PROFIT OR DAMAGE, EVEN IF ROCKWELL AUTOMATION HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGES. ROCKWELL AUTOMATION DISCLAIMS ALL WARRANTIES WHETHER EXPRESSED OR IMPLIED IN RESPECT OF THE INFORMATION (INCLUDING SOFTWARE) PROVIDED HEREBY, INCLUDING THE IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, AND NON-INFRINGEMENT. Note that certain jurisdictions do not countenance the exclusion of implied warranties; thus, this disclaimer may not apply to you.

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Rockwell Automation 首頁 Chevron RightChevron Right
  2. Chevron LeftChevron Left Trust Center Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Security Adv Chevron RightChevron Right
  4. Chevron LeftChevron Left Industrial Security Advisory Detail Chevron RightChevron Right
請更新您的 cookie 設定以繼續.
此功能需要 cookie 來改善您的體驗。請更新您的設定以允許這些 cookie:
  • 社群媒體Cookie
  • 功能Cookie
  • 性能Cookie
  • 行銷Cookie
  • 全部Cookie
您可以隨時更新您的設定。想了解更多訊息,請參閱我們的 {0} 隱私政策
CloseClose