Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-9041

Summary
Assigner-Rockwell
Assigner Org ID-b73dd486-f505-4403-b634-40b078b177f0
Published At-14 Aug, 2025 | 14:17
Updated At-14 Aug, 2025 | 15:01
Rejected At-
Credits

Rockwell Automation FLEX 5000 I/O - Module Fault

A security issue exists due to improper handling of CIP Class 32’s request when a module is inhibited on the 5094-IF8 device. It causes the module to enter a fault state with the Module LED flashing red. Upon un-inhibiting, the module returns a connection fault (Code 16#0010), and the module cannot recover without a power cycle.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Rockwell
Assigner Org ID:b73dd486-f505-4403-b634-40b078b177f0
Published At:14 Aug, 2025 | 14:17
Updated At:14 Aug, 2025 | 15:01
Rejected At:
▼CVE Numbering Authority (CNA)
Rockwell Automation FLEX 5000 I/O - Module Fault

A security issue exists due to improper handling of CIP Class 32’s request when a module is inhibited on the 5094-IF8 device. It causes the module to enter a fault state with the Module LED flashing red. Upon un-inhibiting, the module returns a connection fault (Code 16#0010), and the module cannot recover without a power cycle.

Affected Products
Vendor
Rockwell Automation, Inc.Rockwell Automation
Product
FLEX 5000 I/O
Default Status
unaffected
Versions
Affected
  • Version 2.011 or below
Problem Types
TypeCWE IDDescription
CWECWE-1287CWE-1287: Improper Validation of Specified Type of Input
Type: CWE
CWE ID: CWE-1287
Description: CWE-1287: Improper Validation of Specified Type of Input
Metrics
VersionBase scoreBase severityVector
4.08.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Upgrade to version 2.012 or later

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1737.html
N/A
Hyperlink: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1737.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:PSIRT@rockwellautomation.com
Published At:14 Aug, 2025 | 15:15
Updated At:15 Aug, 2025 | 13:12

A security issue exists due to improper handling of CIP Class 32’s request when a module is inhibited on the 5094-IF8 device. It causes the module to enter a fault state with the Module LED flashing red. Upon un-inhibiting, the module returns a connection fault (Code 16#0010), and the module cannot recover without a power cycle.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-1287SecondaryPSIRT@rockwellautomation.com
CWE ID: CWE-1287
Type: Secondary
Source: PSIRT@rockwellautomation.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1737.htmlPSIRT@rockwellautomation.com
N/A
Hyperlink: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1737.html
Source: PSIRT@rockwellautomation.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

10Records found

CVE-2025-9042
Matching Score-10
Assigner-Rockwell Automation
ShareView Details
Matching Score-10
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.10% / 28.29%
||
7 Day CHG+0.02%
Published-14 Aug, 2025 | 14:23
Updated-15 Aug, 2025 | 13:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FLEX 5000 I/O - Module Fault

A security issue exists due to improper handling of CIP Class 32’s request when a module is inhibited on the 5094-IY8 device. It causes the module to enter a fault state with the Module LED flashing red. Upon un-inhibiting, the module returns a connection fault (Code 16#0010), and the module cannot recover without a power cycle.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FLEX 5000 I/O
CWE ID-CWE-1287
Improper Validation of Specified Type of Input
CVE-2024-10387
Matching Score-8
Assigner-Rockwell Automation
ShareView Details
Matching Score-8
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.06% / 18.28%
||
7 Day CHG+0.01%
Published-25 Oct, 2024 | 17:04
Updated-05 Nov, 2024 | 20:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FactoryTalk ThinManager Denial-of-Service Vulnerability

CVE-2024-10387 IMPACT A Denial-of-Service vulnerability exists in the affected product. The vulnerability could allow a threat actor with network access to send crafted messages to the device, potentially resulting in Denial-of-Service.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-thinmanagerFactoryTalk ThinManagerthinmanager
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-7507
Matching Score-8
Assigner-Rockwell Automation
ShareView Details
Matching Score-8
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.11% / 30.28%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 19:35
Updated-04 Mar, 2025 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix® 5380 Controller Denial-of-Service Vulnerability via Input Validation

CVE-2024-7507 IMPACT A denial-of-service vulnerability exists in the affected products. This vulnerability occurs when a malformed PCCC message is received, causing a fault in the controller.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-compactlogix_5480compactlogix_5380controllogix_5580_firmwarecontrollogix_5580compact_guardlogix_5380_sil_3_firmwarecompact_guardlogix_5380_sil_3compactlogix_5380_firmwarecompact_guardlogix_5380_sil_2_firmwareguardlogix_5580_firmwarecompactlogix_5480_firmwareguardlogix_5580compact_guardlogix_5380_sil_2CompactLogix 5380 (5069 – L3z)CompactLogix 5480 (5069-L4)Compact GuardLogix 5380 (5069- L3zS2)GuardLogix 5580 (1756-L8z)ControlLogix® 5580 (1756 –L8z)controllogix_5580_firmwarecompactlogix_5480_firmwareguardlogix_5580_firmwarecontrollogix_5380_firmwarecompact_guardlogix_5380_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-7515
Matching Score-8
Assigner-Rockwell Automation
ShareView Details
Matching Score-8
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.15% / 35.68%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 19:40
Updated-04 Mar, 2025 | 17:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix® 5380 Controller Denial-of-Service Vulnerability via Input Validation

CVE-2024-7515 IMPACT A denial-of-service vulnerability exists in the affected products. A malformed PTP management packet can cause a major nonrecoverable fault in the controller.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-compactlogix_5480compactlogix_5380controllogix_5580_firmwarecontrollogix_5580compact_guardlogix_5380_sil_3_firmwarecompact_guardlogix_5380_sil_3compactlogix_5380_firmwarecompact_guardlogix_5380_sil_2_firmwareguardlogix_5580_firmwarecompactlogix_5480_firmwareguardlogix_5580compact_guardlogix_5380_sil_2Compact GuardLogix 5380 (5069 – L3zS2)CompactLogix 5480 (5069-L4)ControlLogix® 5580 (1756- L8z)GuardLogix 5580 (1756- L8zS)CompactLogix 5380 (5069-L3z)controllogix_5580_firmwarecompactlogix_5480_firmwarecompactlogix_5380_firmwareguardlogix_5580_firmwarecompact_guardlogix_5380_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-5990
Matching Score-8
Assigner-Rockwell Automation
ShareView Details
Matching Score-8
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.37% / 57.85%
||
7 Day CHG+0.21%
Published-25 Jun, 2024 | 16:11
Updated-01 May, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ThinManager® ThinServer™ Improper Input Validation Vulnerability

Due to an improper input validation, an unauthenticated threat actor can send a malicious message to a monitor thread within Rockwell Automation ThinServer™ and cause a denial-of-service condition on the affected device.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-ThinManager® ThinServer™thinmanager
CWE ID-CWE-20
Improper Input Validation
CVE-2024-6436
Matching Score-8
Assigner-Rockwell Automation
ShareView Details
Matching Score-8
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.18% / 39.72%
||
7 Day CHG~0.00%
Published-27 Sep, 2024 | 19:45
Updated-03 Oct, 2024 | 13:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Input Validation Vulnerability exists in the SequenceManager™ Server

An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-SequenceManager™sequencemanager
CWE ID-CWE-20
Improper Input Validation
CVE-2024-6077
Matching Score-8
Assigner-Rockwell Automation
ShareView Details
Matching Score-8
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.07% / 22.22%
||
7 Day CHG~0.00%
Published-12 Sep, 2024 | 19:59
Updated-19 Sep, 2024 | 14:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation ControlLogix/GuardLogix 5580 and CompactLogix/Compact GuardLogix® 5380 Vulnerable to DoS vulnerability via CIP

A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-compactlogix_5380compact_guardlogix_5380_sil_2_firmware1756-en41756-en4_firmwarecontrollogix_5580controllogix_5580_firmwarecompact_guardlogix_5380_sil_2compactlogix_5480_firmwareguardlogix_5580compactlogix_5380_firmwarecompactlogix_5480guardlogix_5580_firmwarecompact_guardlogix_5380_sil_3compact_guardlogix_5380_sil_3_firmwareCompactLogix 5380ControlLogix® 5580 Process1756-EN4ControlLogix® 5580Compact GuardLogix 5380 SIL 3Compact GuardLogix 5380 SIL 2CompactLogix 5380 ProcessGuardLogix 5580CompactLogix 5480compact_guardlogix_5380_sil2_firmwarecompactlogix_5380_process_firmware1756-en4_firmwarecompactlogix_5480_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-6207
Matching Score-8
Assigner-Rockwell Automation
ShareView Details
Matching Score-8
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.19% / 41.27%
||
7 Day CHG+0.02%
Published-14 Oct, 2024 | 20:53
Updated-21 Oct, 2024 | 13:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CVE 2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and send a specially crafted CIP message to the device. If exploited, a threat actor could help prevent access to the legitimate user and end connections to connected devices including the workstation. To recover the controllers, a download is required which ends any process that the controller is running.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-compactlogix_5380compact_guardlogix_5380_sil_2_firmwarecontrollogix_5580controllogix_5580_process_firmwarefactorytalk_logix_echo_firmwareguardlogix_5580compact_guardlogix_5380_sil_2compactlogix_5480_firmwarecompactlogix_5380_firmwarecompact_guardlogix_5380_sil_3compact_guardlogix_5380_sil_3_firmwarefactorytalk_logix_echocontrollogix_5580_processcontrollogix_5580_firmwareguardlogix_5580_firmwarecompactlogix_5480CompactLogix 5380ControlLogix® 5580 ProcessControlLogix® 5580Compact GuardLogix 5380 SIL 3FactoryTalk® Logix EchoCompactLogix 5480GuardLogix 5580Compact GuardLogix 5380 SIL 2factorytalk_logix_echocompact_guardlogix_5380_sil3_firmwarecontrollogix_5580_process_firmwarecompactlogix_5380_firmwareguardlogix_5580_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-45825
Matching Score-8
Assigner-Rockwell Automation
ShareView Details
Matching Score-8
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.15% / 35.68%
||
7 Day CHG~0.00%
Published-12 Sep, 2024 | 14:28
Updated-02 Oct, 2024 | 14:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
5015-U8IHFT Denial-of-Service Vulnerability via CIP Message

CVE-2024-45825 IMPACT A denial-of-service vulnerability exists in the affected products. The vulnerability occurs when a malformed CIP packet is sent over the network to the device and results in a major nonrecoverable fault causing a denial-of-service.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-5015-u8ihft5015-u8ihft_firmware5015-U8IHFT5015-u8ihft_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2024-40619
Matching Score-8
Assigner-Rockwell Automation
ShareView Details
Matching Score-8
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.15% / 35.68%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 19:52
Updated-31 Jan, 2025 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation GuardLogix/ControlLogix 5580 Controller denial-of-service Vulnerability via Malformed Packet Handling

CVE-2024-40619 IMPACT A denial-of-service vulnerability exists in the affected products. The vulnerability occurs when a malformed CIP packet is sent over the network to the device and results in a major nonrecoverable fault causing a denial-of-service.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-guardlogix_5580_firmwarecontrollogix_5580controllogix_5580_firmwareguardlogix_5580GuardLogix 5580ControlLogix® 5580controllogix_5580_firmwareguardlogix_5580_firmware
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
Details not found