From Debug to Disaster: Rockwell’s Hidden Entry Point for Hackers
From Debug to Disaster: Rockwell’s Hidden Entry Point for Hackers It starts where plant networks feel safest inside the rack. A technician checks a status page; a scanner hums along the controls VLAN; shift change is minutes away. Then a request hits an embedded web-based debugger that never should have shipped enabled. Memory spills. Execution nudges. What felt like a closed OT loop is suddenly permeable from the outside. As a penetration tester and independent blogger, I’m flagging a critical vulnerability in Rockwell Automation’s ControlLogix Ethernet modules. A built-in web debugger (WDB) agent-enabled by default-can be accessed remotely from specific IPs, allowing attackers to dump memory, alter execution, and manipulate system behavior. Tracked as CVE-2025-7353 with a CVSS v3.1 score of 9.8 , this flaw affects several 1756-EN modules , according to Rockwell and CISA. With no authentication required and low complexity , it opens a direct path to core controller communica...