CVE-2025-7350: Critical RCE Flaw in Rockwell Stratix Switches Scores CVSS 9.6



Ddos




September 9, 2025

CVE-2024-21915 Rockwell Stratix switch CVE-2025-7350

Rockwell Automation has issued a security advisory for a critical vulnerability in its Stratix industrial Ethernet switches, tracked as CVE-2025-7350. The flaw, rated CVSS 9.6, could allow unauthenticated remote attackers to achieve remote code execution (RCE) by exploiting cross-site request forgery (CSRF) weaknesses.

According to Rockwell, “A security issue affecting multiple Cisco devices also directly impacts Stratix 5410, 5700, and 8000 devices. This can lead to remote code execution by uploading and running malicious configurations without authentication.”

The vulnerability exists in Stratix IOS software version 15.2(8)E5 and below. Improper handling of requests allows attackers to exploit the CSRF flaw, potentially replacing device configurations with malicious code that grants them full control.

The advisory lists the following Stratix product families as affected:

  • 1783-BMS*
  • 1783-ZMS*
  • 1783-IMS*
  • 1783-HMS*
  • 1783-MS06T
  • 1783-MS10T

Any deployment running Stratix IOS version 15.2(8)E5 or earlier is vulnerable.

Rockwell has released Stratix IOS version 15.2(8)E6 as the patched software. Customers are strongly urged to upgrade immediately.

For those unable to upgrade, Rockwell recommends following “our security best practices.” This includes limiting network exposure of the devices, applying access control lists, and ensuring that only trusted users and systems can reach the management interfaces.

Related Posts:

Previous Article

Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign

Next Article

TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs

Write a Comment

Leave a Comment

Your email address will not be published. Required fields are marked *