Rockwell Automation PowerFlex 525 AC Drives
The PowerFlex 525 AC Drives with embedded EtherNet/IP and Safety contain a vulnerability in the handling of CIP (Common Industrial Protocol) messages that can lead to resource exhaustion, memory corruption, and denial of service. A remote attacker without authentication can send malformed messages to the drive over the network, causing the firmware to exhaust memory or processing resources, resulting in the drive stopping response to legitimate commands. The vulnerability exists in firmware versions 5.001 and earlier.
- Network access to PowerFlex 525 drive on TCP or UDP port 2222 or 44818
- No credentials or authentication required
- The drive must be reachable from the attacker's network segment (e.g., not behind a properly configured firewall)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/88c57edb-bc7d-4697-8375-0037de61b60eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.