A high-severity security vulnerability (CVE-2025-1449) affecting its Verve Asset Manager product could allow attackers with administrative access to execute arbitrary commands.
The vulnerability, discovered in versions 1.39 and earlier, has been assigned a CVSS Base Score of 9.1 (v3.1), indicating critical severity and significant potential impact.
Rockwell ADI Vulnerability
The security flaw, identified as CVE-2025-1449, stems from insufficient variable sanitizing in the administrative web interface of Verve’s Legacy Agentless Device Inventory (ADI) capability.
This capability has been deprecated since version 1.36 but remains present in affected systems.
According to Rockwell Automation, “A portion of the administrative web interface for Verve’s Legacy Agentless Device Inventory (ADI) capability allows users to change a variable with inadequate sanitizing.”
This vulnerability allows threat actors with administrative privileges to execute arbitrary commands within the context of the container that runs the service.
The vulnerability has been classified under CWE-1287: Improper Validation of Specified Type of Input, which is a common weakness in software security.
The summary of the vulnerability is given below:
Risk FactorsDetailsAffected ProductsVerve Asset Manager (versions ≤ 1.39)ImpactAllows attackers with administrative access to execute arbitrary commands.Exploit PrerequisitesAdministrative access to the affected system.CVSS 3.1 Score9.1 (Critical)
Remediation
Rockwell Automation has addressed this security issue in Verve Asset Manager version 1.40, which was released concurrently with the security advisory.
The company urges all customers using affected versions to upgrade to the patched version as soon as possible.
For customers unable to immediately upgrade, Rockwell recommends applying security best practices where possible, although they note that no specific workarounds are available for this vulnerability.
The advisory confirms that while this is a critical vulnerability, it has not been added to CISA’s Known Exploited Vulnerability (KEV) database, suggesting there is no evidence of active exploitation in the wild as of the publication date.
This vulnerability highlights the ongoing security challenges in industrial automation systems, which are increasingly becoming targets for sophisticated threat actors.
The ability to execute arbitrary commands could potentially allow attackers to disrupt industrial processes, access sensitive information, or establish persistence within affected networks.
Industrial organizations using Rockwell Automation’s Verve Asset Manager should conduct immediate risk assessments and prioritize remediation based on their exposure and the criticality of systems running the vulnerable software.
Rockwell Automation stated that customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization for remediation planning.
The company’s security advisory (SD1723) provides additional technical details and guidance for affected customers, including access to Vulnerability Exploitability Exchange format documentation for the CVE-2025-1449 vulnerability.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free