Rockwell Automation Stratix Managed Switches Cross-site Request Forgery to Code Execution (CVE-2025-7350)

high Tenable OT Security Plugin ID 503329

Synopsis

The remote OT asset is affected by a vulnerability.

Description

A security issue affecting multiple Cisco devices also directly impacts Stratix 5410, 5700, and 8000 devices. This can lead to remote code execution by uploading and running malicious configurations without authentication.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Customers using the affected software, who are not able to upgrade to one of the corrected versions, should use Rockwell Automation's security best practices. See https://support.rockwellautomation.com/app/answers/answer_view/a_id/1085012/loc/en_US%22%20/l%20%22__highlight.

See Also

https://nvd.nist.gov/vuln/detail/CVE-2025-7350

http://www.nessus.org/u?64951469

Plugin Details

Severity: High

ID: 503329

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 9/17/2025

Updated: 9/17/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

CVSS v4

Risk Factor: High

Base Score: 8.6

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Vulnerability Information

CPE: cpe:/h:rockwellautomation:allen-bradley_stratix_5400_industrial_managed_ethernet_switch, cpe:/h:rockwellautomation:allen-bradley_stratix_5410_industrial_managed_ethernet_switch, cpe:/h:rockwellautomation:allen-bradley_stratix_5700_industrial_managed_ethernet_switch, cpe:/h:rockwellautomation:allen-bradley_stratix_8000_industrial_managed_ethernet_switch

Required KB Items: Tenable.ot/Rockwell

Exploit Ease: No known exploits are available

Patch Publication Date: 9/9/2025

Vulnerability Publication Date: 9/9/2025

Reference Information

CVE: CVE-2025-7350

CWE: 74