AID
Automation
Information Directory
HomeCVE FeedBrands
AID
Automation Information Directory
CVE data sourced from NIST NVD · Documentation links from official sources
Home›Brands›Rockwell Automation
RO
Platform

Rockwell Automation

Global leader in industrial automation and digital transformation. Products include Allen-Bradley PLCs, PowerFlex drives, FactoryTalk software, and Stratix networking.

https://www.rockwellautomation.com →
247
Total CVEs
12
Resources
49
CRIT
140
HIGH
43
MED
4
LOW
CVEsCVEsSpecsTech SpecsDocsTech DocsImplImplementationsExamplesExamples
247 entries
CVE-2021-27476CRITICAL

A vulnerability exists in the SaveConfigFile function of the RACompare Service, which may allow for OS command injection. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier.

Mar 23, 2022
10.0
CVE-2021-27474CRITICAL

Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier does not properly restrict all functions relating to IIS remoting services. This vulnerability may allow a remote, unauthenticated attacker to modify sensitive data in FactoryTalk AssetCentre.

Mar 23, 2022
10.0
CVE-2021-27472CRITICAL

A vulnerability exists in the RunSearch function of SearchService service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier, which may allow for the execution of remote unauthenticated arbitrary SQL statements.

Mar 23, 2022
10.0
CVE-2021-27470CRITICAL

A deserialization vulnerability exists in how the LogService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.

Mar 23, 2022
10.0
CVE-2021-27468CRITICAL

The AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements.

Mar 23, 2022
10.0
CVE-2021-27466CRITICAL

A deserialization vulnerability exists in how the ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.

Mar 23, 2022
10.0
CVE-2021-27464CRITICAL

The ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements.

Mar 23, 2022
10.0
CVE-2021-27462CRITICAL

A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.

Mar 23, 2022
10.0
CVE-2021-27460CRITICAL

Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier components contain .NET remoting endpoints that deserialize untrusted data without sufficiently verifying that the resulting data will be valid. This vulnerability may allow a remote, unauthenticated attacker to gain full access to the FactoryTalk AssetCentre main server and all agent machines.

Mar 23, 2022
10.0
CVE-2020-14516CRITICAL

In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly.

Mar 18, 2021
10.0
CVE-2017-16740CRITICAL

A Buffer Overflow issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers, Series B and C Versions 21.002 and earlier. The stack-based buffer overflow vulnerability has been identified, which may allow remote code execution.

Jan 9, 2018
10.0
CVE-2016-9343CRITICAL

An issue was discovered in Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.00 through 21.00 (excluding all firmware versions prior to FRN 16.00, which are not affected). By sending malformed common industrial protocol (CIP) packet, an attacker may be able to overflow a stack-based buffer and execute code on the controller or initiate a nonrecoverable fault resulting in a denial of service.

Feb 13, 2017
10.0
CVE-2025-0498CRITICAL

A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to insecure storage of FactoryTalk® Security user tokens, which could allow a threat actor to steal a token and, impersonate another user.

Jan 30, 2025
9.8
CVE-2025-0497CRITICAL

A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to storing credentials in the configuration file of EventLogAttachmentExtractor, ArchiveExtractor, LogCleanUp, or ArchiveLogCleanUp packages.

Jan 30, 2025
9.8
CVE-2025-0477CRITICAL

An encryption vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to a weak encryption methodology and could allow a threat actor to extract passwords belonging to other users of the application.

Jan 30, 2025
9.8
CVE-2024-7961CRITICAL

A path traversal vulnerability exists in the Rockwell Automation affected product. If exploited, the threat actor could upload arbitrary files to the server that could result in a remote code execution.

Sep 12, 2024
9.8
CVE-2024-7988CRITICAL

A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ that allows a threat actor to execute arbitrary code with System privileges. This vulnerability exists due to the lack of proper data input validation, which allows files to be overwritten.

Aug 26, 2024
9.8
CVE-2024-5989CRITICAL

Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.

Jun 25, 2024
9.8
CVE-2024-5988CRITICAL

Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke a local or remote executable and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.

Jun 25, 2024
9.8
CVE-2024-4609CRITICAL

A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could allow a threat actor to inject a malicious SQL statement if the SQL database has no authentication in place or if legitimate credentials were stolen. If exploited, the attack could result in information exposure, revealing sensitive information. Additionally, a threat actor could potentially modify and delete the data in a remote database. An attack would only affect the HMI design time, not runtime.

May 16, 2024
9.8
CVE-2024-21917CRITICAL

A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious user to obtain the service token and use it for authentication on another FTSP directory. This is due to the lack of digital signing between the FTSP service token and directory.  If exploited, a malicious user could potentially retrieve user information and modify settings without any authentication.

Jan 31, 2024
9.8
CVE-2023-2262CRITICAL

A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.

Sep 20, 2023
9.8
CVE-2023-2071CRITICAL

Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets.  The device has the functionality, through a CIP class, to execute exported functions from libraries.  There is a routine that restricts it to execute specific functions from two dynamic link library files.  By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.

Sep 12, 2023
9.8
CVE-2023-2917CRITICAL

The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability.  Due to an improper input validation, a path traversal vulnerability exists, via the filename field, when the ThinManager processes a certain function. If exploited, an unauthenticated remote attacker can upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed.  A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and potentially gain remote code execution abilities.

Aug 17, 2023
9.8
CVE-2023-3595CRITICAL

Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.

Jul 12, 2023
9.8
CVE-2023-27855CRITICAL

In affected versions, a path traversal exists when processing a message in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution.

Mar 22, 2023
9.8
CVE-2021-22681CRITICAL

Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.

Mar 3, 2021
9.8
CVE-2020-27265CRITICAL

KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions are vulnerable to a stack-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and remotely execute code.

Jan 14, 2021
9.8
CVE-2020-6967CRITICAL

In Rockwell Automation all versions of FactoryTalk Diagnostics software, a subsystem of the FactoryTalk Services Platform, FactoryTalk Diagnostics exposes a .NET Remoting endpoint via RNADiagnosticsSrv.exe at TCPtcp/8082, which can insecurely deserialize untrusted data.

Mar 23, 2020
9.8
CVE-2020-6990CRITICAL

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic key utilized to help protect the account password is hard coded into the RSLogix 500 binary file. An attacker could identify cryptographic keys and use it for further cryptographic attacks that could ultimately lead to a remote attacker gaining unauthorized access to the controller.

Mar 16, 2020
9.8
CVE-2019-10970CRITICAL

In Rockwell Automation PanelView 5510 (all versions manufactured before March 13, 2019 that have never been updated to v4.003, v5.002, or later), a remote, unauthenticated threat actor with access to an affected PanelView 5510 Graphic Display, upon successful exploit, may boot-up the terminal and gain root-level access to the device’s file system.

Jul 11, 2019
9.8
CVE-2018-19282CRITICAL

Rockwell Automation PowerFlex 525 AC Drives 5.001 and earlier allow remote attackers to cause a denial of service by crashing the Common Industrial Protocol (CIP) network stack. The vulnerability allows the attacker to crash the CIP in a way that it does not accept new connections, but keeps the current connections active, which can prevent legitimate users from recovering control.

Apr 4, 2019
9.8
CVE-2019-6553CRITICAL

A vulnerability was found in Rockwell Automation RSLinx Classic versions 4.10.00 and prior. An input validation issue in a .dll file of RSLinx Classic where the data in a Forward Open service request is passed to a fixed size buffer, allowing an attacker to exploit a stack-based buffer overflow condition.

Apr 4, 2019
9.8
CVE-2010-5305CRITICAL

The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product’s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services.

Mar 26, 2019
9.8
CVE-2018-14829CRITICAL

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.

Sep 20, 2018
9.8
CVE-2017-7903CRITICAL

A Weak Password Requirements issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected products use a numeric password with a small maximum character size for the password.

Jun 30, 2017
9.8
CVE-2017-7902CRITICAL

A "Reusing a Nonce, Key Pair in Encryption" issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected product reuses nonces, which may allow an attacker to capture and replay a valid request until the nonce is changed.

Jun 30, 2017
9.8
CVE-2017-7899CRITICAL

An Information Exposure issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. User credentials are sent to the web server using the HTTP GET method, which may result in the credentials being logged. This could make user credentials available for unauthorized retrieval.

Jun 30, 2017
9.8
CVE-2017-7898CRITICAL

An Improper Restriction of Excessive Authentication Attempts issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. There are no penalties for repeatedly entering incorrect passwords.

Jun 30, 2017
9.8
CVE-2016-4522CRITICAL

SQL injection vulnerability in Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

Jul 28, 2016
9.8
CVE-2016-0868CRITICAL

Stack-based buffer overflow on Rockwell Automation Allen-Bradley MicroLogix 1100 devices A through 15.000 and B before 15.002 allows remote attackers to execute arbitrary code via a crafted web request.

Jan 28, 2016
9.8
CVE-2023-2746CRITICAL

The Rockwell Automation Enhanced HIM software contains an API that the application uses that is not protected sufficiently and uses incorrect Cross-Origin Resource Sharing (CORS) settings and, as a result, is vulnerable to a Cross Site Request Forgery (CSRF) attack. To exploit this vulnerability, a malicious user would have to convince a user to click on an untrusted link through a social engineering attack or successfully perform a Cross Site Scripting Attack (XSS). Exploitation of a CSRF could potentially lead to sensitive information disclosure and full remote access to the affected products.

Jul 11, 2023
9.6
CVE-2023-1834CRITICAL

Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running v7.13 may have the telnet and FTP ports open by default.  This could potentially allow attackers unauthorized access to the device through the open ports.

May 11, 2023
9.4
CVE-2024-7960CRITICAL

The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to having an incorrect privilege matrix that allows users to have access to functions they should not.

Sep 12, 2024
9.1
CVE-2020-25176CRITICAL

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

Mar 18, 2022
9.1
CVE-2020-27267CRITICAL

KEPServerEX v6.0 to v6.9, ThingWorx Kepware Server v6.8 and v6.9, ThingWorx Industrial Connectivity (all versions), OPC-Aggregator (all versions), Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server v7.68.804 and v7.66, and Software Toolbox TOP Server all 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.

Jan 14, 2021
9.1
CVE-2020-27263CRITICAL

KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.

Jan 14, 2021
9.1
CVE-2024-21915CRITICAL

A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable.

Feb 16, 2024
9.0
CVE-2020-12029CRITICAL

All versions of FactoryTalk View SE do not properly validate input of filenames within a project directory. A remote, unauthenticated attacker may be able to execute a crafted file on a remote endpoint that may result in remote code execution (RCE). Rockwell Automation recommends applying patch 1126289. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.

Jul 20, 2020
9.0
CVE-2012-4715HIGH

Buffer overflow in LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a UDP packet with a certain integer length value that is (1) too large or (2) too small, leading to improper handling by Logger.dll.

Apr 18, 2013
10.0
CVE-2012-6437HIGH

The device does not properly authenticate users and the potential exists for a remote user to upload a new firmware image to the Ethernet card, whether it is a corrupt or legitimate firmware image. Successful exploitation of this vulnerability could cause loss of availability, integrity, and confidentiality and a disruption in communications with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
10.0
CVE-2010-2965HIGH

The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used on the Rockwell Automation 1756-ENBT series A with firmware 3.2.6 and 3.6.1 and other products, allows remote attackers to read or modify arbitrary memory locations, perform function calls, or manage tasks via requests to UDP port 17185, a related issue to CVE-2005-3804.

Aug 5, 2010
10.0
CVE-2009-3739HIGH

Multiple unspecified vulnerabilities on the Rockwell Automation AB Micrologix 1100 and 1400 controllers allow remote attackers to obtain privileged access or cause a denial of service (halt) via unknown vectors.

Jan 19, 2010
10.0
CVE-2012-6440HIGH

The Web server password authentication mechanism used by the products is vulnerable to a MitM and Replay attack. Successful exploitation of this vulnerability will allow unauthorized access of the product’s Web server to view and alter product configuration and diagnostics information. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
9.3
CVE-2011-2530HIGH

Buffer overflow in RSEds.dll in RSHWare.exe in the EDS Hardware Installation Tool 1.0.5.1 and earlier in Rockwell Automation RSLinx Classic before 2.58 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed .eds file.

Jun 22, 2011
9.3
CVE-2025-9065HIGH

A server-side request forgery security issue exists within Rockwell Automation ThinManager® software due to the lack of input sanitization. Authenticated attackers can exploit this vulnerability by specifying external SMB paths, exposing the ThinServer® service account NTLM hash.

Sep 9, 2025
8.8
CVE-2024-8533HIGH

A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulnerability occurs due to improper default file permissions allowing users to exfiltrate credentials and escalate privileges.

Sep 12, 2024
8.8
CVE-2023-29463HIGH

The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users’ session data and or log users out of their session.

Sep 12, 2023
8.8
CVE-2023-2072HIGH

The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product.  The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.

Jul 11, 2023
8.8
CVE-2022-3158HIGH

Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to an input validation vulnerability. The FactoryTalk VantagePoint SQL Server lacks input validation when users enter SQL statements to retrieve information from the back-end database. If successfully exploited, this could allow a user with basic user privileges to perform remote code execution on the server.

Oct 17, 2022
8.8
CVE-2022-38743HIGH

Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to an improper access control vulnerability. The FactoryTalk VantagePoint SQL Server account could allow a malicious user with read-only privileges to execute SQL statements in the back-end database. If successfully exploited, this could allow the attacker to execute arbitrary code and gain access to restricted data.

Oct 17, 2022
8.8
CVE-2020-12033HIGH

In Rockwell Automation FactoryTalk Services Platform, all versions, the redundancy host service (RdcyHost.exe) does not validate supplied identifiers, which could allow an unauthenticated, adjacent attacker to execute remote COM objects with elevated privileges.

Jun 23, 2020
8.8
CVE-2024-3493HIGH

A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices.

Apr 15, 2024
8.6
CVE-2024-21916HIGH

A denial-of-service vulnerability exists in specific Rockwell Automation ControlLogix ang GuardLogix controllers. If exploited, the product could potentially experience a major nonrecoverable fault (MNRF). The device will restart itself to recover from the MNRF.

Jan 31, 2024
8.6
CVE-2023-2423HIGH

A vulnerability was discovered in the Rockwell Automation Armor PowerFlex device when the product sends communications to the local event log. Threat actors could exploit this vulnerability by sending an influx of network commands, causing the product to generate an influx of event log traffic at a high rate. If exploited, the product would stop normal operations and self-reset creating a denial-of-service condition. The error code would need to be cleared prior to resuming normal operations.

Aug 8, 2023
8.6
CVE-2022-3752HIGH

An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online and continue normal operation.

Dec 19, 2022
8.6
CVE-2022-3157HIGH

A vulnerability exists in the Rockwell Automation controllers that allows a malformed CIP request to cause a major non-recoverable fault (MNRF) and a denial-of-service condition (DOS).

Dec 16, 2022
8.6
CVE-2022-2465HIGH

Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Deserialization of Untrusted Data vulnerability. ISaGRAF Workbench does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in ISaGRAF Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited.

Aug 25, 2022
8.6
CVE-2021-27475HIGH

Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited.

Mar 23, 2022
8.6
CVE-2021-33012HIGH

Rockwell Automation MicroLogix 1100, all versions, allows a remote, unauthenticated attacker sending specially crafted commands to cause the PLC to fault when the controller is switched to RUN mode, which results in a denial-of-service condition. If successfully exploited, this vulnerability will cause the controller to fault whenever the controller is switched to RUN mode.

Jul 9, 2021
8.6
CVE-2021-22659HIGH

Rockwell Automation MicroLogix 1400 Version 21.6 and below may allow a remote unauthenticated attacker to send a specially crafted Modbus packet allowing the attacker to retrieve or modify random values in the register. If successfully exploited, this may lead to a buffer overflow resulting in a denial-of-service condition. The FAULT LED will flash RED and communications may be lost. Recovery from denial-of-service condition requires the fault to be cleared by the user.

Mar 25, 2021
8.6
CVE-2018-17924HIGH

Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.

Dec 7, 2018
8.6
CVE-2017-7901HIGH

A Predictable Value Range from Previous Values issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. Insufficiently random TCP initial sequence numbers are generated, which may allow an attacker to predict the numbers from previous values. This may allow an attacker to spoof or disrupt TCP connections, resulting in a denial of service for the target device.

Jun 30, 2017
8.6
CVE-2017-7914HIGH

A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access.

Jun 14, 2017
8.6
CVE-2016-5814HIGH

Buffer overflow in Rockwell Automation RSLogix Micro Starter Lite, RSLogix Micro Developer, RSLogix 500 Starter Edition, RSLogix 500 Standard Edition, and RSLogix 500 Professional Edition allows remote attackers to execute arbitrary code via a crafted RSS project file.

Sep 19, 2016
8.6
CVE-2021-32960HIGH

Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine.

Apr 1, 2022
8.5
CVE-2012-6439HIGH

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that changes the product’s configuration and network parameters, a DoS condition can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.  Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
8.5
CVE-2023-29464HIGH

FactoryTalk Linx, in the Rockwell Automation PanelView Plus, allows an unauthenticated threat actor to read data from memory via crafted malicious packets. Sending a size larger than the buffer size results in leakage of data from memory resulting in an information disclosure. If the size is large enough, it causes communications over the common industrial protocol to become unresponsive to any type of packet, resulting in a denial-of-service to FactoryTalk Linx over the common industrial protocol.

Oct 13, 2023
8.2
CVE-2022-38742HIGH

Rockwell Automation ThinManager ThinServer versions 11.0.0 - 13.0.0 is vulnerable to a heap-based buffer overflow. An attacker could send a specifically crafted TFTP or HTTPS request, causing a heap-based buffer overflow that crashes the ThinServer process. If successfully exploited, this could expose the server to arbitrary remote code execution.

Sep 23, 2022
8.1
CVE-2018-19616HIGH

An issue was discovered in Rockwell Automation Allen-Bradley PowerMonitor 1000. An unauthenticated user can add/edit/remove administrators because access control is implemented on the client side via a disabled attribute for a BUTTON element.

Dec 26, 2018
8.1
CVE-2025-9068HIGH

A security issue exists within the Rockwell Automation Driver Package x64 Microsoft Installer File (MSI) repair functionality, installed with FTLinx. Authenticated attackers with valid Windows Users credentials can initiate a repair and hijack the resulting console window for vbpinstall.exe. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.

Oct 14, 2025
7.8
CVE-2025-7033HIGH

A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.

Aug 5, 2025
7.8
CVE-2025-7032HIGH

A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.

Aug 5, 2025
7.8
CVE-2025-7025HIGH

A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.

Aug 5, 2025
7.8
CVE-2025-6377HIGH

A remote code execution security issue exists in the Rockwell Automation Arena®.  A crafted DOE file can force Arena Simulation to write beyond the boundaries of an allocated object. Exploitation requires user interaction, such as opening a malicious file within the software. If exploited, a threat actor could execute arbitrary code on the target system. The software must run under the context of the administrator in order to cause worse case impact. This is reflected in the Rockwell CVSS score, as AT:P.

Jul 9, 2025
7.8
CVE-2025-6376HIGH

A remote code execution security issue exists in the Rockwell Automation Arena®.  A crafted DOE file can force Arena Simulation to write beyond the boundaries of an allocated object. Exploitation requires user interaction, such as opening a malicious file within the software. If exploited, a threat actor could execute arbitrary code on the target system. The software must run under the context of the administrator in order to cause worse case impact. This is reflected in the Rockwell CVSS score, as AT:P.

Jul 9, 2025
7.8
CVE-2025-3617HIGH

A privilege escalation vulnerability exists in the Rockwell Automation ThinManager. When the software starts up, files are deleted in the temporary folder causing the Access Control Entry of the directory to inherit permissions from the parent directory. If exploited, a threat actor could inherit elevated privileges.

Apr 15, 2025
7.8
CVE-2025-3289HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-3288HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-3287HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-3286HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-3285HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-2829HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-2293HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-2288HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-2287HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-2286HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-2285HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2024-12175HIGH

Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 19, 2024
7.8
CVE-2024-12130HIGH

An “out of bounds read” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to read beyond the boundaries of an allocated memory. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 5, 2024
7.8
CVE-2024-11156HIGH

An “out of bounds write” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 5, 2024
7.8
CVE-2024-11155HIGH

A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 5, 2024
7.8
CVE-2024-7987HIGH

A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ that allows a threat actor to execute arbitrary code with System privileges. To exploit this vulnerability and a threat actor must abuse the ThinServer™ service by creating a junction and use it to upload arbitrary files.

Aug 26, 2024
7.8
CVE-2024-2929HIGH

A memory corruption vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by corrupting the memory triggering an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
7.8
CVE-2024-21919HIGH

An uninitialized pointer in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by leveraging the pointer after it is properly. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
7.8
CVE-2024-21918HIGH

A memory buffer vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by corrupting the memory and triggering an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
7.8
CVE-2024-21913HIGH

A heap-based memory buffer overflow vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code into the software by overstepping the memory boundaries, which triggers an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
7.8
CVE-2024-21912HIGH

An arbitrary code execution vulnerability in Rockwell Automation Arena Simulation could let a malicious user insert unauthorized code into the software. This is done by writing beyond the designated memory area, which causes an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
7.8
CVE-2023-27858HIGH

Rockwell Automation Arena Simulation contains an arbitrary code execution vulnerability that could potentially allow a malicious user to commit unauthorized code to the software by using an uninitialized pointer in the application.  The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product.  The user would need to open a malicious file provided to them by the attacker for the code to execute.

Oct 27, 2023
7.8
CVE-2023-27854HIGH

An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow.  The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product.  The user would need to open a malicious file provided to them by the attacker for the code to execute.

Oct 27, 2023
7.8
CVE-2023-29462HIGH

An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow in the heap. potentially resulting in a complete loss of confidentiality, integrity, and availability.

May 9, 2023
7.8
CVE-2023-29461HIGH

An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow in the heap. potentially resulting in a complete loss of confidentiality, integrity, and availability.

May 9, 2023
7.8
CVE-2023-29460HIGH

An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow potentially resulting in a complete loss of confidentiality, integrity, and availability.

May 9, 2023
7.8
CVE-2022-3156HIGH

A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate software.  Users are granted elevated permissions on certain product services when the software is installed. Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software.

Dec 27, 2022
7.8
CVE-2020-25184HIGH

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x stores the password in plaintext in a file that is in the same directory as the executable file. ISaGRAF Runtime reads the file and saves the data in a variable without any additional modification. A local, unauthenticated attacker could compromise the user passwords, resulting in information disclosure.

Mar 18, 2022
7.8
CVE-2021-22665HIGH

Rockwell Automation DriveTools SP v5.13 and below and Drives AOP v4.12 and below both contain a vulnerability that a local attacker with limited privileges may be able to exploit resulting in privilege escalation and complete control of the system.

Mar 18, 2021
7.8
CVE-2020-10642HIGH

In Rockwell Automation RSLinx Classic versions 4.11.00 and prior, an authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic.

Apr 13, 2020
7.8
CVE-2019-13521HIGH

A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simulation Software version 16.00.00 and earlier may result in the limited exposure of information related to the targeted workstation. Rockwell Automation has released version 16.00.01 of Arena Simulation Software to address the reported vulnerabilities.

Jan 27, 2020
7.8
CVE-2019-13519HIGH

A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simulation Software version 16.00.00 and earlier may result in the limited exposure of information related to the targeted workstation. Rockwell Automation has released version 16.00.01 of Arena Simulation Software to address the reported vulnerabilities.

Jan 27, 2020
7.8
CVE-2019-13527HIGH

In Rockwell Automation Arena Simulation Software Cat. 9502-Ax, Versions 16.00.00 and earlier, a maliciously crafted Arena file opened by an unsuspecting user may result in the use of a pointer that has not been initialized.

Sep 24, 2019
7.8
CVE-2019-13510HIGH

Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE AFTER FREE CWE-416. A maliciously crafted Arena file opened by an unsuspecting user may result in the application crashing or the execution of arbitrary code.

Aug 15, 2019
7.8
CVE-2017-6015HIGH

Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later.

May 11, 2018
7.8
CVE-2012-4714HIGH

Integer overflow in RNADiagnostics.dll in Rockwell Automation FactoryTalk Services Platform (FTSP) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (service outage or RNADiagReceiver.exe daemon crash) via UDP data that specifies a large integer value.

Apr 18, 2013
7.8
CVE-2012-4713HIGH

Integer signedness error in RNADiagnostics.dll in Rockwell Automation FactoryTalk Services Platform (FTSP) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (service outage or RNADiagReceiver.exe daemon crash) via UDP data that specifies a negative integer value.

Apr 18, 2013
7.8
CVE-2012-6442HIGH

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the product to reset, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
7.8
CVE-2012-6438HIGH

The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the NIC to crash. Successful exploitation of this vulnerability could cause loss of availability and a disruption in communications with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
7.8
CVE-2012-6436HIGH

The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the CPU to crash. Successful exploitation of this vulnerability could cause loss of availability and a disruption in communications with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
7.8
CVE-2012-6435HIGH

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the CPU to stop logic execution and enter a fault state, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
7.8
CVE-2024-7847HIGH

VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. A feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention. This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution. Connected devices may also be impacted by exploitation of this vulnerability.

Oct 14, 2024
7.7
CVE-2022-2464HIGH

Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. Crafted malicious files can allow an attacker to traverse the file system when opened by ISaGRAF Workbench. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the ISaGRAF Workbench software. User interaction is required for this exploit to be successful.

Aug 25, 2022
7.7
CVE-2022-1159HIGH

Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user.

Apr 1, 2022
7.7
CVE-2021-27471HIGH

The parsing mechanism that processes certain file types does not provide input sanitization for file paths. This may allow an attacker to craft malicious files that, when opened by Rockwell Automation Connected Components Workbench v12.00.00 and prior, can traverse the file system. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the Connected Components Workbench software. User interaction is required for this exploit to be successful.

Mar 23, 2022
7.7
CVE-2024-9124HIGH

A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 600T. If the device is overloaded with requests, it will become unavailable. The device may require a power cycle to recover it if it does not re-establish a connection after it stops receiving requests.

Oct 8, 2024
7.5
CVE-2024-8626HIGH

Due to a memory leak, a denial-of-service vulnerability exists in the Rockwell Automation affected products. A malicious actor could exploit this vulnerability by performing multiple actions on certain web pages of the product causing the affected products to become fully unavailable and require a power cycle to recover.

Oct 8, 2024
7.5
CVE-2024-6077HIGH

A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.

Sep 12, 2024
7.5
CVE-2024-7986HIGH

A vulnerability exists in the Rockwell Automation ThinManager® ThinServer that allows a threat actor to disclose sensitive information. A threat actor can exploit this vulnerability by abusing the ThinServer™ service to read arbitrary files by creating a junction that points to the target directory.

Aug 23, 2024
7.5
CVE-2024-6089HIGH

An input validation vulnerability exists in the Rockwell Automation 5015 - AENFTXT when a manipulated PTP packet is sent, causing the secondary adapter to result in a major nonrecoverable fault. If exploited, a power cycle is required to recover the product.

Jul 16, 2024
7.5
CVE-2024-5990HIGH

Due to an improper input validation, an unauthenticated threat actor can send a malicious message to a monitor thread within Rockwell Automation ThinServer™ and cause a denial-of-service condition on the affected device.

Jun 25, 2024
7.5
CVE-2024-37368HIGH

A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. Due to the lack of proper authentication, this action is allowed without proper authentication verification.

Jun 14, 2024
7.5
CVE-2024-37367HIGH

A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE v12. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. This action is allowed without proper authentication verification.

Jun 14, 2024
7.5
CVE-2024-2424HIGH

An input validation vulnerability exists in the Rockwell Automation 5015-AENFTXT that causes the secondary adapter to result in a major nonrecoverable fault (MNRF) when malicious input is entered. If exploited, the availability of the device will be impacted, and a manual restart is required. Additionally, a malformed PTP packet is needed to exploit this vulnerability.

Apr 15, 2024
7.5
CVE-2024-2427HIGH

A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper traffic throttling in the device. If multiple data packets are sent to the device repeatedly the device will crash and require a manual restart to recover.

Mar 25, 2024
7.5
CVE-2024-2426HIGH

A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper input validation in the device. If exploited, a disruption in the CIP communication will occur and a manual restart will be required by the user to recover it.

Mar 25, 2024
7.5
CVE-2024-2425HIGH

A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper input validation in the device. If exploited, the web server will crash and need a manual restart to recover it.

Mar 25, 2024
7.5
CVE-2023-46289HIGH

Rockwell Automation FactoryTalk View Site Edition insufficiently validates user input, which could potentially allow threat actors to send malicious data bringing the product offline. If exploited, the product would become unavailable and require a restart to recover resulting in a denial-of-service condition.

Oct 27, 2023
7.5
CVE-2023-2915HIGH

The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, Due to improper input validation, a path traversal vulnerability exists when the ThinManager software processes a certain function. If exploited, an unauthenticated remote threat actor can delete arbitrary files with system privileges. A malicious user could exploit this vulnerability by sending a specifically crafted synchronization protocol message resulting in a denial-of-service condition.

Aug 17, 2023
7.5
CVE-2023-2914HIGH

The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, an integer overflow condition exists in the affected products. When the ThinManager processes incoming messages, a read access violation occurs and terminates the process. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and causing a denial of service condition in the software.

Aug 17, 2023
7.5
CVE-2023-2913HIGH

An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.

Jul 18, 2023
7.5
CVE-2023-2263HIGH

The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing.  The new ENIP connections cannot be established if impacted by this vulnerability,  which prohibits operational capabilities of the device resulting in a denial-of-service attack.

Jul 18, 2023
7.5
CVE-2023-3596HIGH

Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.

Jul 12, 2023
7.5
CVE-2023-2778HIGH

A denial-of-service vulnerability exists in Rockwell Automation FactoryTalk Transaction Manager. This vulnerability can be exploited by sending a modified packet to port 400. If exploited, the application could potentially crash or experience a high CPU or memory usage condition, causing intermittent application functionality issues. The application would need to be restarted to recover from the DoS.

Jun 13, 2023
7.5
CVE-2023-2443HIGH

Rockwell Automation ThinManager product allows the use of medium strength ciphers.  If the client requests an insecure cipher, a malicious actor could potentially decrypt traffic sent between the client and server API.

May 11, 2023
7.5
CVE-2023-27857HIGH

In affected versions, a heap-based buffer over-read condition occurs when the message field indicates more data than is present in the message field in Rockwell Automation's ThinManager ThinServer.  An unauthenticated remote attacker can exploit this vulnerability to crash ThinServer.exe due to a read access violation.

Mar 22, 2023
7.5
CVE-2023-27856HIGH

In affected versions, path traversal exists when processing a message of type 8 in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.

Mar 22, 2023
7.5
CVE-2022-3166HIGH

Rockwell Automation was made aware that the webservers of the Micrologix 1100 and 1400 controllers contain a vulnerability that may lead to a denial-of-service condition. The security vulnerability could be exploited by an attacker with network access to the affected systems by sending TCP packets to webserver and closing it abruptly which would cause a denial-of-service condition for the web server application on the device

Dec 16, 2022
7.5
CVE-2022-38744HIGH

An unauthenticated attacker with network access to a victim's Rockwell Automation FactoryTalk Alarm and Events service could open a connection, causing the service to fault and become unavailable. The affected port could be used as a server ping port and uses messages structured with XML.

Oct 27, 2022
7.5
CVE-2020-25178HIGH

ISaGRAF Workbench communicates with Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x using TCP/IP. This communication protocol provides various file system operations, as well as the uploading of applications. Data is transferred over this protocol unencrypted, which could allow a remote unauthenticated attacker to upload, read, and delete files.

Mar 18, 2022
7.5
CVE-2020-13573HIGH

A denial-of-service vulnerability exists in the Ethernet/IP server functionality of Rockwell Automation RSLinx Classic 2.57.00.14 CPR 9 SR 3. A specially crafted network request can lead to a denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability.

Jan 7, 2021
7.5
CVE-2020-12031HIGH

In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the operating system, a local, authenticated attacker may corrupt the associated memory space allowing for arbitrary code execution. Rockwell Automation recommends applying patch 1126290. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.

Jul 20, 2020
7.5
CVE-2020-6988HIGH

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an attacker to bypass authentication altogether, disclose sensitive information, or leak credentials.

Mar 16, 2020
7.5
CVE-2020-6984HIGH

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic function utilized to protect the password in MicroLogix is discoverable.

Mar 16, 2020
7.5
CVE-2018-19016HIGH

Rockwell Automation EtherNet/IP Web Server Modules 1756-EWEB (includes 1756-EWEBK) Version 5.001 and earlier, and CompactLogix 1768-EWEB Version 2.005 and earlier. A remote attacker could send a crafted UDP packet to the SNMP service causing a denial-of-service condition to occur until the affected product is restarted.

Mar 27, 2019
7.5
CVE-2013-2805HIGH

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it receives a datagram with an incorrect value in the “Record Data Size” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to an oversized value, an attacker could cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to this vulnerability can be found at the following Rockwell Automation Security Advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

Mar 26, 2019
7.5
CVE-2013-2807HIGH

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the “Total Record Size” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to a specifically oversized value, the service will calculate an undersized value for the “Total Record Size” that will cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation Security Advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

Mar 26, 2019
7.5
CVE-2013-2806HIGH

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the “End of Current Record” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to a specifically oversized value, the service will calculate an undersized value for the “Total Record Size.” Then the service will calculate an incorrect value for the “End of Current Record” field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

Mar 26, 2019
7.5
CVE-2018-18981HIGH

In Rockwell Automation FactoryTalk Services Platform 2.90 and earlier, a remote unauthenticated attacker could send numerous crafted packets to service ports resulting in memory consumption that could lead to a partial or complete denial-of-service condition to the affected services.

Jan 24, 2019
7.5
CVE-2018-14827HIGH

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat actor may intentionally send specially crafted Ethernet/IP packets to Port 44818, causing the software application to stop responding and crash. The user must restart the software to regain functionality.

Sep 20, 2018
7.5
CVE-2018-14821HIGH

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.

Sep 20, 2018
7.5
CVE-2017-14022HIGH

An Improper Input Validation issue was discovered in Rockwell Automation FactoryTalk Alarms and Events, Version 2.90 and earlier. An unauthenticated attacker with remote access to a network with FactoryTalk Alarms and Events can send a specially crafted set of packets packet to Port 403/TCP (the history archiver service), causing the service to either stall or terminate.

Dec 23, 2017
7.5
CVE-2017-7924HIGH

An Improper Input Validation issue was discovered in Rockwell Automation MicroLogix 1100 controllers 1763-L16BWA, 1763-L16AWA, 1763-L16BBB, and 1763-L16DWD. A remote, unauthenticated attacker could send a single, specially crafted Programmable Controller Communication Commands (PCCC) packet to the controller that could potentially cause the controller to enter a DoS condition.

Sep 20, 2017
7.5
CVE-2014-5424HIGH

Rockwell Automation Connected Components Workbench (CCW) before 7.00.00 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an invalid property value to an ActiveX control that was built with an outdated compiler.

Nov 14, 2014
7.5
CVE-2025-11918HIGH

Rockwell Automation Arena® suffers from a stack-based buffer overflow vulnerability. The specific flaw exists within the parsing of DOE files. Local attackers are able to exploit this issue to potentially execute arbitrary code on affected installations of Arena®. Exploiting the vulnerability requires opening a malicious DOE file.

Nov 14, 2025
7.3
CVE-2024-12672HIGH

A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 19, 2024
7.3
CVE-2024-11364HIGH

Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 19, 2024
7.3
CVE-2024-11157HIGH

A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 19, 2024
7.3
CVE-2023-2637HIGH

Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies.  Hard-coded cryptographic key may lead to privilege escalation.  This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.

Jun 13, 2023
7.3
CVE-2020-12028HIGH

In all versions of FactoryTalk View SEA remote, an authenticated attacker may be able to utilize certain handlers to interact with the data on the remote endpoint since those handlers do not enforce appropriate permissions. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs.

Jul 20, 2020
7.3
CVE-2016-9334HIGH

An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; 1763-L16BWA, Series A and B, Version 14.000 and prior versions; and 1763-L16DWD, Series A and B, Version 14.000 and prior versions. User credentials are sent to the web server in clear text, which may allow an attacker to discover the credentials if they are able to observe traffic between the web browser and the server.

Feb 13, 2017
7.3
CVE-2016-5645HIGH

Rockwell Automation MicroLogix 1400 PLC 1766-L32BWA, 1766-L32AWA, 1766-L32BXB, 1766-L32BWAA, 1766-L32AWAA, and 1766-L32BXBA devices have a hardcoded SNMP community, which makes it easier for remote attackers to load arbitrary firmware updates by leveraging knowledge of this community.

Aug 24, 2016
7.3
CVE-2016-4531HIGH

Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 does not invalidate credentials upon a logout action, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.

Jul 28, 2016
7.3
CVE-2023-2444HIGH

A cross site request forgery vulnerability exists in Rockwell Automation's FactoryTalk Vantagepoint. This vulnerability can be exploited in two ways. If an attacker sends a malicious link to a computer that is on the same domain as the FactoryTalk Vantagepoint server and a user clicks the link, the attacker could impersonate the legitimate user and send requests to the affected product.  Additionally, if an attacker sends an untrusted link to a computer that is not on the same domain as the server and a user opens the FactoryTalk Vantagepoint website, enters credentials for the FactoryTalk Vantagepoint server, and clicks on the malicious link a cross site request forgery attack would be successful as well.

May 11, 2023
7.1
CVE-2022-46670HIGH

Rockwell Automation was made aware of a vulnerability by a security researcher from Georgia Institute of Technology that the MicroLogix 1100 and 1400 controllers contain a vulnerability that may give an attacker the ability to accomplish remote code execution.  The vulnerability is an unauthenticated stored cross-site scripting vulnerability in the embedded webserver. The payload is transferred to the controller over SNMP and is rendered on the homepage of the embedded website.

Dec 16, 2022
7.1
CVE-2014-5410HIGH

The DNP3 feature on Rockwell Automation Allen-Bradley MicroLogix 1400 1766-Lxxxxx A FRN controllers 7 and earlier and 1400 1766-Lxxxxx B FRN controllers before 15.001 allows remote attackers to cause a denial of service (process disruption) via malformed packets over (1) an Ethernet network or (2) a serial line.

Oct 3, 2014
7.1
CVE-2012-4695HIGH

LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (service outage) via a zero-byte UDP packet that is not properly handled by Logger.dll.

Apr 18, 2013
7.1
CVE-2012-4690HIGH

Rockwell Automation Allen-Bradley MicroLogix controller 1100, 1200, 1400, and 1500; SLC 500 controller platform; and PLC-5 controller platform, when Static status is not enabled, allow remote attackers to cause a denial of service via messages that trigger modification of status bits.

Dec 8, 2012
7.1
CVE-2023-29031HIGH

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.

May 11, 2023
7.0
CVE-2023-29030HIGH

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.

May 11, 2023
7.0
CVE-2023-29023HIGH

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.

May 11, 2023
7.0
CVE-2017-5176HIGH

A DLL Hijack issue was discovered in Rockwell Automation Connected Components Workbench (CCW). The following versions are affected: Connected Components Workbench - Developer Edition, v9.01.00 and earlier: 9328-CCWDEVENE, 9328-CCWDEVZHE, 9328-CCWDEVFRE, 9328-CCWDEVITE, 9328-CCWDEVDEE, 9328-CCWDEVESE, and 9328-CCWDEVPTE; and Connected Components Workbench - Free Standard Edition (All Supported Languages), v9.01.00 and earlier. Certain DLLs included with versions of CCW software can be potentially hijacked to allow an attacker to gain rights to a victim's affected personal computer. Such access rights can be at the same or potentially higher level of privileges as the compromised user account, including and up to computer administrator privileges.

May 19, 2017
7.0
CVE-2014-9204MEDIUM

Stack-based buffer overflow in OPCTest.exe in Rockwell Automation RSLinx Classic before 3.73.00 allows remote attackers to execute arbitrary code via a crafted CSV file.

May 17, 2015
6.9
CVE-2014-9209MEDIUM

Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryTalk Services Platform before 2.71.00 and FactoryTalk View Studio 8.00.00 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

Mar 31, 2015
6.9
CVE-2011-2957MEDIUM

Unspecified vulnerability in Rockwell Automation FactoryTalk Diagnostics Viewer before V2.30.00 (CPR9 SR3) allows local users to execute arbitrary code via a crafted FactoryTalk Diagnostics Viewer (.ftd) configuration file, which triggers memory corruption.

Jul 28, 2011
6.9
CVE-2022-1797MEDIUM

A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online.

Jun 2, 2022
6.8
CVE-2009-0473MEDIUM

Open redirect vulnerability in the web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

Feb 6, 2009
6.8
CVE-2024-11158MEDIUM

An “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable before it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 5, 2024
6.7
CVE-2020-25182MEDIUM

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.

Mar 18, 2022
6.7
CVE-2024-6436MEDIUM

An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.

Sep 27, 2024
6.5
CVE-2024-6325MEDIUM

The v6.40 release of Rockwell Automation FactoryTalk® Policy Manager CVE-2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html  by implementing CIP security and did not update to the versions of the software CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html  and CVE-2022-1161. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html

Jul 16, 2024
6.5
CVE-2024-5659MEDIUM

Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the same network to result in a major nonrecoverable fault(MNRF/Assert). This vulnerability could be exploited by sending abnormal packets to the mDNS port. If exploited, the availability of the device would be compromised.

Jun 14, 2024
6.5
CVE-2022-2179MEDIUM

The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks.

Jul 20, 2022
6.5
CVE-2016-2277MEDIUM

IAB.exe in Rockwell Automation Integrated Architecture Builder (IAB) before 9.6.0.8 and 9.7.x before 9.7.0.2 allows remote attackers to execute arbitrary code via a crafted project file.

Apr 6, 2016
6.3
CVE-2014-0755MEDIUM

Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password protection for .ACD files (aka project files), which allows local users to obtain sensitive information or modify data via unspecified vectors.

Feb 5, 2014
6.3
CVE-2022-2463MEDIUM

Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. A crafted malicious .7z exchange file may allow an attacker to gain the privileges of the ISaGRAF Workbench software when opened. If the software is running at the SYSTEM level, then the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.

Aug 25, 2022
6.1
CVE-2021-27473MEDIUM

Rockwell Automation Connected Components Workbench v12.00.00 and prior does not sanitize paths specified within the .ccwarc archive file during extraction. This type of vulnerability is also commonly referred to as a Zip Slip. A local, authenticated attacker can create a malicious .ccwarc archive file that, when opened by Connected Components Workbench, will allow the attacker to gain the privileges of the software. If the software is running at SYSTEM level, the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.

Mar 23, 2022
6.1
CVE-2019-10955MEDIUM

In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earlier, MicroLogix 1100 Controllers v14.00 and earlier, CompactLogix 5370 L1 controllers v30.014 and earlier, CompactLogix 5370 L2 controllers v30.014 and earlier, CompactLogix 5370 L3 controllers (includes CompactLogix GuardLogix controllers) v30.014 and earlier, an open redirect vulnerability could allow a remote unauthenticated attacker to input a malicious link to redirect users to a malicious site that could run or download arbitrary malware on the user’s machine.

Apr 25, 2019
6.1
CVE-2018-19615MEDIUM

Rockwell Automation Allen-Bradley PowerMonitor 1000 all versions. A remote attacker could inject arbitrary code into a targeted user’s web browser to gain access to the affected device.

Dec 26, 2018
6.1
CVE-2016-2279MEDIUM

Cross-site scripting (XSS) vulnerability in the web server in Rockwell Automation Allen-Bradley CompactLogix 1769-L* before 28.011+ allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Mar 2, 2016
6.1
CVE-2023-2638MEDIUM

Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected.   Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives.  This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.

Jun 13, 2023
5.9
CVE-2017-6024MEDIUM

A Resource Exhaustion issue was discovered in Rockwell Automation ControlLogix 5580 controllers V28.011, V28.012, and V28.013; ControlLogix 5580 controllers V29.011; CompactLogix 5380 controllers V28.011; and CompactLogix 5380 controllers V29.011. This vulnerability may allow an attacker to cause a denial of service condition by sending a series of specific CIP-based commands to the controller.

May 6, 2017
5.9
CVE-2020-6998MEDIUM

The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop. This may allow an attacker to send specially crafted CIP packet requests to a controller, which may cause denial-of-service conditions in communications with other products.

Jul 27, 2022
5.8
CVE-2025-3618MEDIUM

A denial-of-service vulnerability exists in the Rockwell Automation ThinManager. The software fails to adequately verify the outcome of memory allocation while processing Type 18 messages. If exploited, a threat actor could cause a denial-of-service on the target software.

Apr 15, 2025
5.5
CVE-2024-6326MEDIUM

An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk® System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, which temporarily exposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network.

Jul 16, 2024
5.5
CVE-2023-29024MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product A cross site scripting vulnerability was discovered that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.

May 11, 2023
5.5
CVE-2018-8843MEDIUM

Rockwell Automation Arena versions 15.10.00 and prior contains a use after free vulnerability caused by processing specially crafted Arena Simulation Software files that may cause the software application to crash, potentially losing any unsaved data..

May 14, 2018
5.5
CVE-2024-21914MEDIUM

A vulnerability exists in the affected product that allows a malicious user to restart the Rockwell Automation PanelView™ Plus 7 terminal remotely without security protections. If the vulnerability is exploited, it could lead to the loss of view or control of the PanelView™ product.

Mar 25, 2024
5.3
CVE-2023-0027MEDIUM

Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected device’s Modbus TCP Server AOI information.

Mar 17, 2023
5.3
CVE-2020-25180MEDIUM

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.

Mar 18, 2022
5.3
CVE-2012-6441MEDIUM

An information exposure of confidential information results when the device receives a specially crafted CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP. Successful exploitation of this vulnerability could cause loss of confidentiality. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
5.0
CVE-2012-0222MEDIUM

The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet.

Apr 2, 2012
5.0
CVE-2012-0221MEDIUM

The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 does not properly handle the return value from an unspecified function, which allows remote attackers to cause a denial of service (service outage) via a crafted packet.

Apr 2, 2012
5.0
CVE-2009-0474MEDIUM

The web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allows remote attackers to obtain "internal web page information" and "internal information about the module" via unspecified vectors. NOTE: this may overlap CVE-2002-1603.

Feb 6, 2009
5.0
CVE-2015-1010MEDIUM

Rockwell Automation RSView32 7.60.00 (aka CPR9 SR4) and earlier does not properly encrypt credentials, which allows local users to obtain sensitive information by reading a file and conducting a decryption attack.

May 31, 2015
4.9
CVE-2023-29029MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29028MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29027MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29026MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29025MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29022MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2024-21920MEDIUM

A memory buffer vulnerability in Rockwell Automation Arena Simulation could potentially let a threat actor read beyond the intended memory boundaries. This could reveal sensitive information and even cause the application to crash, resulting in a denial-of-service condition. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
4.4
CVE-2020-12027MEDIUM

All versions of FactoryTalk View SE disclose the hostnames and file paths for certain files within the system. A remote, authenticated attacker may be able to leverage this information for reconnaissance efforts. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs.

Jul 20, 2020
4.3
CVE-2009-0472MEDIUM

Multiple cross-site scripting (XSS) vulnerabilities in the web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Feb 6, 2009
4.3
CVE-2023-2639MEDIUM

The underlying feedback mechanism of Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.  This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy. 

Jun 13, 2023
4.1
CVE-2020-12025LOW

Rockwell Automation Logix Designer Studio 5000 Versions 32.00, 32.01, and 32.02 vulnerable to an xml external entity (XXE) vulnerability, which may allow an attacker to view hostnames or other resources from the program.

Jul 14, 2020
3.3
CVE-2020-6980LOW

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, If Simple Mail Transfer Protocol (SMTP) account data is saved in RSLogix 500, a local attacker with access to a victim’s project may be able to gather SMTP server authentication data as it is written to the project file in cleartext.

Mar 16, 2020
3.3
CVE-2019-13511LOW

Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain an INFORMATION EXPOSURE CWE-200. A maliciously crafted Arena file opened by an unsuspecting user may result in the limited exposure of information related to the targeted workstation.

Aug 15, 2019
3.3
CVE-2016-9338LOW

An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; 1763-L16BWA, Series A and B, Version 14.000 and prior versions; and 1763-L16DWD, Series A and B, Version 14.000 and prior versions. Because of an Incorrect Permission Assignment for Critical Resource, users with administrator privileges may be able to remove all administrative users requiring a factory reset to restore ancillary web server function. Exploitation of this vulnerability will still allow the affected device to function in its capacity as a controller.

Feb 13, 2017
2.7
CVE-2025-7353Awaiting Analysis

A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow.

Aug 14, 2025
0.0
CVE-2025-1449Awaiting Analysis

A vulnerability exists in the Rockwell Automation Verve Asset Manager due to insufficient variable sanitizing. A portion of the administrative web interface for Verve's Legacy Agentless Device Inventory (ADI) capability (deprecated since the 1.36 release) allows users to change a variable with inadequate sanitizing. If exploited, it could allow a threat actor with administrative access to run arbitrary commands in the context of the container running the service.

Mar 31, 2025
0.0
CVE-2025-0659Awaiting Analysis

A path traversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Private Cloud. By specifying the character sequence in the body of the vulnerable endpoint, it is possible to overwrite files outside of the intended directory. A threat actor with admin privileges could leverage this vulnerability to overwrite reports including user projects.

Jan 28, 2025
0.0
CVE-2024-12373Awaiting Analysis

A denial-of-service vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in a buffer-overflow, potentially causing denial-of-service.

Dec 18, 2024
0.0
CVE-2024-12372Awaiting Analysis

A denial-of-service and possible remote code execution vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in corruption of the heap memory which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack.

Dec 18, 2024
0.0
CVE-2024-12371Awaiting Analysis

A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.

Dec 18, 2024
0.0
CVE-2024-9412Awaiting Analysis

An improper authorization vulnerability exists in the Rockwell Automation affected products that could allow an unauthorized user to sign in. While removal of all role mappings is unlikely, it could occur in the case of unexpected or accidental removal by the administrator. If exploited, an unauthorized user could access data they previously but should no longer have access to.

Oct 8, 2024
0.0
CVE-2024-7567Awaiting Analysis

A denial-of-service vulnerability exists via the CIP/Modbus port in the Rockwell Automation Micro850/870 (2080 -L50E/2080 -L70E). If exploited, the CIP/Modbus communication may be disrupted for short duration.

Aug 13, 2024
0.0
CVE-2024-6079Awaiting Analysis

A vulnerability exists in the Rockwell Automation Emulate3D™, which could be leveraged to execute a DLL Hijacking attack. The application loads shared libraries, which are readable and writable by any user. If exploited, a malicious user could leverage a malicious dll and perform a remote code execution attack.

Aug 13, 2024
0.0
CVE-2024-6242Awaiting Analysis

A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.

Aug 1, 2024
0.0
CVE-2024-3640Awaiting Analysis

An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability.

May 16, 2024
0.0
CVE ID ⇅Severity ↓CVSS ⇅DescriptionPublished ⇅
CVE-2021-27476CRITICAL
10.0
A vulnerability exists in the SaveConfigFile function of the RACompare Service, which may allow for …Mar 23, 2022›
CVE-2021-27474CRITICAL
10.0
Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier does not properly restrict all functi…Mar 23, 2022›
CVE-2021-27472CRITICAL
10.0
A vulnerability exists in the RunSearch function of SearchService service in Rockwell Automation Fac…Mar 23, 2022›
CVE-2021-27470CRITICAL
10.0
A deserialization vulnerability exists in how the LogService.rem service in Rockwell Automation Fact…Mar 23, 2022›
CVE-2021-27468CRITICAL
10.0
The AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes…Mar 23, 2022›
CVE-2021-27466CRITICAL
10.0
A deserialization vulnerability exists in how the ArchiveService.rem service in Rockwell Automation …Mar 23, 2022›
CVE-2021-27464CRITICAL
10.0
The ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exp…Mar 23, 2022›
CVE-2021-27462CRITICAL
10.0
A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation Fact…Mar 23, 2022›
CVE-2021-27460CRITICAL
10.0
Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier components contain .NET remoting endp…Mar 23, 2022›
CVE-2020-14516CRITICAL
10.0
In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue…Mar 18, 2021›
CVE-2017-16740CRITICAL
10.0
A Buffer Overflow issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1400 Controll…Jan 9, 2018›
CVE-2016-9343CRITICAL
10.0
An issue was discovered in Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.0…Feb 13, 2017›
CVE-2025-0498CRITICAL
9.8
A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation Fact…Jan 30, 2025›
CVE-2025-0497CRITICAL
9.8
A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation Fact…Jan 30, 2025›
CVE-2025-0477CRITICAL
9.8
An encryption vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation Factor…Jan 30, 2025›
CVE-2024-7961CRITICAL
9.8
A path traversal vulnerability exists in the Rockwell Automation affected product. If exploited, th…Sep 12, 2024›
CVE-2024-7988CRITICAL
9.8
A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ tha…Aug 26, 2024›
CVE-2024-5989CRITICAL
9.8
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to…Jun 25, 2024›
CVE-2024-5988CRITICAL
9.8
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to…Jun 25, 2024›
CVE-2024-4609CRITICAL
9.8
A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could a…May 16, 2024›
CVE-2024-21917CRITICAL
9.8
A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious …Jan 31, 2024›
CVE-2023-2262CRITICAL
9.8
A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication d…Sep 20, 2023›
CVE-2023-2071CRITICAL
9.8
Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies use…Sep 12, 2023›
CVE-2023-2917CRITICAL
9.8
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerabi…Aug 17, 2023›
CVE-2023-3595CRITICAL
9.8
Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix com…Jul 12, 2023›
CVE-2023-27855CRITICAL
9.8
In affected versions, a path traversal exists when processing a message in Rockwell Automation's Th…Mar 22, 2023›
CVE-2021-22681CRITICAL
9.8
Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 t…Mar 3, 2021›
CVE-2020-27265CRITICAL
9.8
KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivit…Jan 14, 2021›
CVE-2020-6967CRITICAL
9.8
In Rockwell Automation all versions of FactoryTalk Diagnostics software, a subsystem of the FactoryT…Mar 23, 2020›
CVE-2020-6990CRITICAL
9.8
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, …Mar 16, 2020›
CVE-2019-10970CRITICAL
9.8
In Rockwell Automation PanelView 5510 (all versions manufactured before March 13, 2019 that have nev…Jul 11, 2019›
CVE-2018-19282CRITICAL
9.8
Rockwell Automation PowerFlex 525 AC Drives 5.001 and earlier allow remote attackers to cause a deni…Apr 4, 2019›
CVE-2019-6553CRITICAL
9.8
A vulnerability was found in Rockwell Automation RSLinx Classic versions 4.10.00 and prior. An input…Apr 4, 2019›
CVE-2010-5305CRITICAL
9.8
The potential exists for exposure of the product's password used to restrict unauthorized access to …Mar 26, 2019›
CVE-2018-14829CRITICAL
9.8
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote…Sep 20, 2018›
CVE-2017-7903CRITICAL
9.8
A Weak Password Requirements issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 11…Jun 30, 2017›
CVE-2017-7902CRITICAL
9.8
A "Reusing a Nonce, Key Pair in Encryption" issue was discovered in Rockwell Automation Allen-Bradle…Jun 30, 2017›
CVE-2017-7899CRITICAL
9.8
An Information Exposure issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 pr…Jun 30, 2017›
CVE-2017-7898CRITICAL
9.8
An Improper Restriction of Excessive Authentication Attempts issue was discovered in Rockwell Automa…Jun 30, 2017›
CVE-2016-4522CRITICAL
9.8
SQL injection vulnerability in Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 allows re…Jul 28, 2016›
CVE-2016-0868CRITICAL
9.8
Stack-based buffer overflow on Rockwell Automation Allen-Bradley MicroLogix 1100 devices A through 1…Jan 28, 2016›
CVE-2023-2746CRITICAL
9.6
The Rockwell Automation Enhanced HIM software contains an API that the application uses that is no…Jul 11, 2023›
CVE-2023-1834CRITICAL
9.4
Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and Janu…May 11, 2023›
CVE-2024-7960CRITICAL
9.1
The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view…Sep 12, 2024›
CVE-2020-25176CRITICAL
9.1
Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (I…Mar 18, 2022›
CVE-2020-27267CRITICAL
9.1
KEPServerEX v6.0 to v6.9, ThingWorx Kepware Server v6.8 and v6.9, ThingWorx Industrial Connectivity …Jan 14, 2021›
CVE-2020-27263CRITICAL
9.1
KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivit…Jan 14, 2021›
CVE-2024-21915CRITICAL
9.0
A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (F…Feb 16, 2024›
CVE-2020-12029CRITICAL
9.0
All versions of FactoryTalk View SE do not properly validate input of filenames within a project dir…Jul 20, 2020›
CVE-2012-4715HIGH
10.0
Buffer overflow in LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2…Apr 18, 2013›
CVE-2012-6437HIGH
10.0
The device does not properly authenticate users and the potential exists for a remote user to upload…Jan 24, 2013›
CVE-2010-2965HIGH
10.0
The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used on the Rockw…Aug 5, 2010›
CVE-2009-3739HIGH
10.0
Multiple unspecified vulnerabilities on the Rockwell Automation AB Micrologix 1100 and 1400 controll…Jan 19, 2010›
CVE-2012-6440HIGH
9.3
The Web server password authentication mechanism used by the products is vulnerable to a MitM and Re…Jan 24, 2013›
CVE-2011-2530HIGH
9.3
Buffer overflow in RSEds.dll in RSHWare.exe in the EDS Hardware Installation Tool 1.0.5.1 and earlie…Jun 22, 2011›
CVE-2025-9065HIGH
8.8
A server-side request forgery security issue exists within Rockwell Automation ThinManager® software…Sep 9, 2025›
CVE-2024-8533HIGH
8.8
A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulner…Sep 12, 2024›
CVE-2023-29463HIGH
8.8
The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does n…Sep 12, 2023›
CVE-2023-2072HIGH
8.8
The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities withi…Jul 11, 2023›
CVE-2022-3158HIGH
8.8
Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to …Oct 17, 2022›
CVE-2022-38743HIGH
8.8
Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to …Oct 17, 2022›
CVE-2020-12033HIGH
8.8
In Rockwell Automation FactoryTalk Services Platform, all versions, the redundancy host service (Rdc…Jun 23, 2020›
CVE-2024-3493HIGH
8.6
A specific malformed fragmented packet type (fragmented packets may be generated automatically by d…Apr 15, 2024›
CVE-2024-21916HIGH
8.6
A denial-of-service vulnerability exists in specific Rockwell Automation ControlLogix ang GuardLogi…Jan 31, 2024›
CVE-2023-2423HIGH
8.6
A vulnerability was discovered in the Rockwell Automation Armor PowerFlex device when the product s…Aug 8, 2023›
CVE-2022-3752HIGH
8.6
An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with h…Dec 19, 2022›
CVE-2022-3157HIGH
8.6
A vulnerability exists in the Rockwell Automation controllers that allows a malformed CIP request t…Dec 16, 2022›
CVE-2022-2465HIGH
8.6
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Deserial…Aug 25, 2022›
CVE-2021-27475HIGH
8.6
Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects th…Mar 23, 2022›
CVE-2021-33012HIGH
8.6
Rockwell Automation MicroLogix 1100, all versions, allows a remote, unauthenticated attacker sending…Jul 9, 2021›
CVE-2021-22659HIGH
8.6
Rockwell Automation MicroLogix 1400 Version 21.6 and below may allow a remote unauthenticated attack…Mar 25, 2021›
CVE-2018-17924HIGH
8.6
Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unau…Dec 7, 2018›
CVE-2017-7901HIGH
8.6
A Predictable Value Range from Previous Values issue was discovered in Rockwell Automation Allen-Bra…Jun 30, 2017›
CVE-2017-7914HIGH
8.6
A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.0…Jun 14, 2017›
CVE-2016-5814HIGH
8.6
Buffer overflow in Rockwell Automation RSLogix Micro Starter Lite, RSLogix Micro Developer, RSLogix …Sep 19, 2016›
CVE-2021-32960HIGH
8.5
Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enab…Apr 1, 2022›
CVE-2012-6439HIGH
8.5
When an affected product receives a valid CIP message from an unauthorized or unintended source to…Jan 24, 2013›
CVE-2023-29464HIGH
8.2
FactoryTalk Linx, in the Rockwell Automation PanelView Plus, allows an unauthenticated threat actor…Oct 13, 2023›
CVE-2022-38742HIGH
8.1
Rockwell Automation ThinManager ThinServer versions 11.0.0 - 13.0.0 is vulnerable to a heap-based bu…Sep 23, 2022›
CVE-2018-19616HIGH
8.1
An issue was discovered in Rockwell Automation Allen-Bradley PowerMonitor 1000. An unauthenticated u…Dec 26, 2018›
CVE-2025-9068HIGH
7.8
A security issue exists within the Rockwell Automation Driver Package x64 Microsoft Installer File (…Oct 14, 2025›
CVE-2025-7033HIGH
7.8
A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Ar…Aug 5, 2025›
CVE-2025-7032HIGH
7.8
A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Ar…Aug 5, 2025›
CVE-2025-7025HIGH
7.8
A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Ar…Aug 5, 2025›
CVE-2025-6377HIGH
7.8
A remote code execution security issue exists in the Rockwell Automation Arena®.  A crafted DOE file…Jul 9, 2025›
CVE-2025-6376HIGH
7.8
A remote code execution security issue exists in the Rockwell Automation Arena®.  A crafted DOE file…Jul 9, 2025›
CVE-2025-3617HIGH
7.8
A privilege escalation vulnerability exists in the Rockwell Automation ThinManager. When the softwar…Apr 15, 2025›
CVE-2025-3289HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based m…Apr 8, 2025›
CVE-2025-3288HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor …Apr 8, 2025›
CVE-2025-3287HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based m…Apr 8, 2025›
CVE-2025-3286HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor …Apr 8, 2025›
CVE-2025-3285HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor …Apr 8, 2025›
CVE-2025-2829HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor …Apr 8, 2025›
CVE-2025-2293HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor …Apr 8, 2025›
CVE-2025-2288HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor …Apr 8, 2025›
CVE-2025-2287HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitializ…Apr 8, 2025›
CVE-2025-2286HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitializ…Apr 8, 2025›
CVE-2025-2285HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitializ…Apr 8, 2025›
CVE-2024-12175HIGH
7.8
Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that …Dec 19, 2024›
CVE-2024-12130HIGH
7.8
An “out of bounds read” code execution vulnerability exists in the Rockwell Automation Arena® that…Dec 5, 2024›
CVE-2024-11156HIGH
7.8
An “out of bounds write” code execution vulnerability exists in the Rockwell Automation Arena® t…Dec 5, 2024›
CVE-2024-11155HIGH
7.8
A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could…Dec 5, 2024›
CVE-2024-7987HIGH
7.8
A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ tha…Aug 26, 2024›
CVE-2024-2929HIGH
7.8
A memory corruption vulnerability in Rockwell Automation Arena Simulation software could potentiall…Mar 26, 2024›
CVE-2024-21919HIGH
7.8
An uninitialized pointer in Rockwell Automation Arena Simulation software could potentially allow a…Mar 26, 2024›
CVE-2024-21918HIGH
7.8
A memory buffer vulnerability in Rockwell Automation Arena Simulation software could potentially al…Mar 26, 2024›
CVE-2024-21913HIGH
7.8
A heap-based memory buffer overflow vulnerability in Rockwell Automation Arena Simulation software …Mar 26, 2024›
CVE-2024-21912HIGH
7.8
An arbitrary code execution vulnerability in Rockwell Automation Arena Simulation could let a malic…Mar 26, 2024›
CVE-2023-27858HIGH
7.8
Rockwell Automation Arena Simulation contains an arbitrary code execution vulnerability that could …Oct 27, 2023›
CVE-2023-27854HIGH
7.8
An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation t…Oct 27, 2023›
CVE-2023-29462HIGH
7.8
An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation softwa…May 9, 2023›
CVE-2023-29461HIGH
7.8
An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation softwa…May 9, 2023›
CVE-2023-29460HIGH
7.8
An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation softwa…May 9, 2023›
CVE-2022-3156HIGH
7.8
A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate softwa…Dec 27, 2022›
CVE-2020-25184HIGH
7.8
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x stores the password in plaintext in a file …Mar 18, 2022›
CVE-2021-22665HIGH
7.8
Rockwell Automation DriveTools SP v5.13 and below and Drives AOP v4.12 and below both contain a vuln…Mar 18, 2021›
CVE-2020-10642HIGH
7.8
In Rockwell Automation RSLinx Classic versions 4.11.00 and prior, an authenticated local attacker co…Apr 13, 2020›
CVE-2019-13521HIGH
7.8
A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simul…Jan 27, 2020›
CVE-2019-13519HIGH
7.8
A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simul…Jan 27, 2020›
CVE-2019-13527HIGH
7.8
In Rockwell Automation Arena Simulation Software Cat. 9502-Ax, Versions 16.00.00 and earlier, a mali…Sep 24, 2019›
CVE-2019-13510HIGH
7.8
Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE AFTER FREE…Aug 15, 2019›
CVE-2017-6015HIGH
7.8
Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activat…May 11, 2018›
CVE-2012-4714HIGH
7.8
Integer overflow in RNADiagnostics.dll in Rockwell Automation FactoryTalk Services Platform (FTSP) C…Apr 18, 2013›
CVE-2012-4713HIGH
7.8
Integer signedness error in RNADiagnostics.dll in Rockwell Automation FactoryTalk Services Platform …Apr 18, 2013›
CVE-2012-6442HIGH
7.8
When an affected product receives a valid CIP message from an unauthorized or unintended source to P…Jan 24, 2013›
CVE-2012-6438HIGH
7.8
The device does not properly validate the data being sent to the buffer. An attacker can send a malf…Jan 24, 2013›
CVE-2012-6436HIGH
7.8
The device does not properly validate the data being sent to the buffer. An attacker can send a malf…Jan 24, 2013›
CVE-2012-6435HIGH
7.8
When an affected product receives a valid CIP message from an unauthorized or unintended source to P…Jan 24, 2013›
CVE-2024-7847HIGH
7.7
VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to as…Oct 14, 2024›
CVE-2022-2464HIGH
7.7
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Tra…Aug 25, 2022›
CVE-2022-1159HIGH
7.7
Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who ac…Apr 1, 2022›
CVE-2021-27471HIGH
7.7
The parsing mechanism that processes certain file types does not provide input sanitization for file…Mar 23, 2022›
CVE-2024-9124HIGH
7.5
A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 600T. If the device i…Oct 8, 2024›
CVE-2024-8626HIGH
7.5
Due to a memory leak, a denial-of-service vulnerability exists in the Rockwell Automation affected p…Oct 8, 2024›
CVE-2024-6077HIGH
7.5
A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially…Sep 12, 2024›
CVE-2024-7986HIGH
7.5
A vulnerability exists in the Rockwell Automation ThinManager® ThinServer that allows a threat actor…Aug 23, 2024›
CVE-2024-6089HIGH
7.5
An input validation vulnerability exists in the Rockwell Automation 5015 - AENFTXT when a manipulate…Jul 16, 2024›
CVE-2024-5990HIGH
7.5
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to…Jun 25, 2024›
CVE-2024-37368HIGH
7.5
A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE. The vuln…Jun 14, 2024›
CVE-2024-37367HIGH
7.5
A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE v12. The …Jun 14, 2024›
CVE-2024-2424HIGH
7.5
An input validation vulnerability exists in the Rockwell Automation 5015-AENFTXT that causes the se…Apr 15, 2024›
CVE-2024-2427HIGH
7.5
A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper …Mar 25, 2024›
CVE-2024-2426HIGH
7.5
A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper …Mar 25, 2024›
CVE-2024-2425HIGH
7.5
A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper …Mar 25, 2024›
CVE-2023-46289HIGH
7.5
Rockwell Automation FactoryTalk View Site Edition insufficiently validates user input, which could …Oct 27, 2023›
CVE-2023-2915HIGH
7.5
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerabi…Aug 17, 2023›
CVE-2023-2914HIGH
7.5
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerabi…Aug 17, 2023›
CVE-2023-2913HIGH
7.5
An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API…Jul 18, 2023›
CVE-2023-2263HIGH
7.5
The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing.  Th…Jul 18, 2023›
CVE-2023-3596HIGH
7.5
Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication prod…Jul 12, 2023›
CVE-2023-2778HIGH
7.5
A denial-of-service vulnerability exists in Rockwell Automation FactoryTalk Transaction Manager. Th…Jun 13, 2023›
CVE-2023-2443HIGH
7.5
Rockwell Automation ThinManager product allows the use of medium strength ciphers.  If the client r…May 11, 2023›
CVE-2023-27857HIGH
7.5
In affected versions, a heap-based buffer over-read condition occurs when the message field indica…Mar 22, 2023›
CVE-2023-27856HIGH
7.5
In affected versions, path traversal exists when processing a message of type 8 in Rockwell Aut…Mar 22, 2023›
CVE-2022-3166HIGH
7.5
Rockwell Automation was made aware that the webservers of the Micrologix 1100 and 1400 controllers …Dec 16, 2022›
CVE-2022-38744HIGH
7.5
An unauthenticated attacker with network access to a victim's Rockwell Automation FactoryTalk Alarm…Oct 27, 2022›
CVE-2020-25178HIGH
7.5
ISaGRAF Workbench communicates with Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x using T…Mar 18, 2022›
CVE-2020-13573HIGH
7.5
A denial-of-service vulnerability exists in the Ethernet/IP server functionality of Rockwell Automat…Jan 7, 2021›
CVE-2020-12031HIGH
7.5
In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the op…Jul 20, 2020›
CVE-2020-6988HIGH
7.5
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, …Mar 16, 2020›
CVE-2020-6984HIGH
7.5
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, …Mar 16, 2020›
CVE-2018-19016HIGH
7.5
Rockwell Automation EtherNet/IP Web Server Modules 1756-EWEB (includes 1756-EWEBK) Version 5.001 and…Mar 27, 2019›
CVE-2013-2805HIGH
7.5
Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3,…Mar 26, 2019›
CVE-2013-2807HIGH
7.5
Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3,…Mar 26, 2019›
CVE-2013-2806HIGH
7.5
Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3,…Mar 26, 2019›
CVE-2018-18981HIGH
7.5
In Rockwell Automation FactoryTalk Services Platform 2.90 and earlier, a remote unauthenticated atta…Jan 24, 2019›
CVE-2018-14827HIGH
7.5
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat acto…Sep 20, 2018›
CVE-2018-14821HIGH
7.5
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote…Sep 20, 2018›
CVE-2017-14022HIGH
7.5
An Improper Input Validation issue was discovered in Rockwell Automation FactoryTalk Alarms and Even…Dec 23, 2017›
CVE-2017-7924HIGH
7.5
An Improper Input Validation issue was discovered in Rockwell Automation MicroLogix 1100 controllers…Sep 20, 2017›
CVE-2014-5424HIGH
7.5
Rockwell Automation Connected Components Workbench (CCW) before 7.00.00 allows remote attackers to c…Nov 14, 2014›
CVE-2025-11918HIGH
7.3
Rockwell Automation Arena® suffers from a stack-based buffer overflow vulnerability. The specific fl…Nov 14, 2025›
CVE-2024-12672HIGH
7.3
A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor…Dec 19, 2024›
CVE-2024-11364HIGH
7.3
Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Aren…Dec 19, 2024›
CVE-2024-11157HIGH
7.3
A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor…Dec 19, 2024›
CVE-2023-2637HIGH
7.3
Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate a…Jun 13, 2023›
CVE-2020-12028HIGH
7.3
In all versions of FactoryTalk View SEA remote, an authenticated attacker may be able to utilize cer…Jul 20, 2020›
CVE-2016-9334HIGH
7.3
An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA,…Feb 13, 2017›
CVE-2016-5645HIGH
7.3
Rockwell Automation MicroLogix 1400 PLC 1766-L32BWA, 1766-L32AWA, 1766-L32BXB, 1766-L32BWAA, 1766-L3…Aug 24, 2016›
CVE-2016-4531HIGH
7.3
Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 does not invalidate credentials upon a l…Jul 28, 2016›
CVE-2023-2444HIGH
7.1
A cross site request forgery vulnerability exists in Rockwell Automation's FactoryTalk Vantagepoint…May 11, 2023›
CVE-2022-46670HIGH
7.1
Rockwell Automation was made aware of a vulnerability by a security researcher from Georgia Institu…Dec 16, 2022›
CVE-2014-5410HIGH
7.1
The DNP3 feature on Rockwell Automation Allen-Bradley MicroLogix 1400 1766-Lxxxxx A FRN controllers …Oct 3, 2014›
CVE-2012-4695HIGH
7.1
LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR…Apr 18, 2013›
CVE-2012-4690HIGH
7.1
Rockwell Automation Allen-Bradley MicroLogix controller 1100, 1200, 1400, and 1500; SLC 500 controll…Dec 8, 2012›
CVE-2023-29031HIGH
7.0
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29030HIGH
7.0
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29023HIGH
7.0
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2017-5176HIGH
7.0
A DLL Hijack issue was discovered in Rockwell Automation Connected Components Workbench (CCW). The f…May 19, 2017›
CVE-2014-9204MEDIUM
6.9
Stack-based buffer overflow in OPCTest.exe in Rockwell Automation RSLinx Classic before 3.73.00 allo…May 17, 2015›
CVE-2014-9209MEDIUM
6.9
Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryT…Mar 31, 2015›
CVE-2011-2957MEDIUM
6.9
Unspecified vulnerability in Rockwell Automation FactoryTalk Diagnostics Viewer before V2.30.00 (CPR…Jul 28, 2011›
CVE-2022-1797MEDIUM
6.8
A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-o…Jun 2, 2022›
CVE-2009-0473MEDIUM
6.8
Open redirect vulnerability in the web interface in the Rockwell Automation ControlLogix 1756-ENBT/A…Feb 6, 2009›
CVE-2024-11158MEDIUM
6.7
An “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® …Dec 5, 2024›
CVE-2020-25182MEDIUM
6.7
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libr…Mar 18, 2022›
CVE-2024-6436MEDIUM
6.5
An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could al…Sep 27, 2024›
CVE-2024-6325MEDIUM
6.5
The v6.40 release of Rockwell Automation FactoryTalk® Policy Manager CVE-2021-22681 https://www.rock…Jul 16, 2024›
CVE-2024-5659MEDIUM
6.5
Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the sa…Jun 14, 2024›
CVE-2022-2179MEDIUM
6.5
The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is …Jul 20, 2022›
CVE-2016-2277MEDIUM
6.3
IAB.exe in Rockwell Automation Integrated Architecture Builder (IAB) before 9.6.0.8 and 9.7.x before…Apr 6, 2016›
CVE-2014-0755MEDIUM
6.3
Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password pro…Feb 5, 2014›
CVE-2022-2463MEDIUM
6.1
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Tra…Aug 25, 2022›
CVE-2021-27473MEDIUM
6.1
Rockwell Automation Connected Components Workbench v12.00.00 and prior does not sanitize paths speci…Mar 23, 2022›
CVE-2019-10955MEDIUM
6.1
In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earl…Apr 25, 2019›
CVE-2018-19615MEDIUM
6.1
Rockwell Automation Allen-Bradley PowerMonitor 1000 all versions. A remote attacker could inject arb…Dec 26, 2018›
CVE-2016-2279MEDIUM
6.1
Cross-site scripting (XSS) vulnerability in the web server in Rockwell Automation Allen-Bradley Comp…Mar 2, 2016›
CVE-2023-2638MEDIUM
5.9
Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archi…Jun 13, 2023›
CVE-2017-6024MEDIUM
5.9
A Resource Exhaustion issue was discovered in Rockwell Automation ControlLogix 5580 controllers V28.…May 6, 2017›
CVE-2020-6998MEDIUM
5.8
The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLog…Jul 27, 2022›
CVE-2025-3618MEDIUM
5.5
A denial-of-service vulnerability exists in the Rockwell Automation ThinManager. The software fails …Apr 15, 2025›
CVE-2024-6326MEDIUM
5.5
An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk® Sy…Jul 16, 2024›
CVE-2023-29024MEDIUM
5.5
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2018-8843MEDIUM
5.5
Rockwell Automation Arena versions 15.10.00 and prior contains a use after free vulnerability caused…May 14, 2018›
CVE-2024-21914MEDIUM
5.3
A vulnerability exists in the affected product that allows a malicious user to restart the Rockwell…Mar 25, 2024›
CVE-2023-0027MEDIUM
5.3
Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sen…Mar 17, 2023›
CVE-2020-25180MEDIUM
5.3
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a pas…Mar 18, 2022›
CVE-2012-6441MEDIUM
5.0
An information exposure of confidential information results when the device receives a specially cra…Jan 24, 2013›
CVE-2012-0222MEDIUM
5.0
The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 t…Apr 2, 2012›
CVE-2012-0221MEDIUM
5.0
The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 t…Apr 2, 2012›
CVE-2009-0474MEDIUM
5.0
The web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allo…Feb 6, 2009›
CVE-2015-1010MEDIUM
4.9
Rockwell Automation RSView32 7.60.00 (aka CPR9 SR4) and earlier does not properly encrypt credential…May 31, 2015›
CVE-2023-29029MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29028MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29027MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29026MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29025MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29022MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2024-21920MEDIUM
4.4
A memory buffer vulnerability in Rockwell Automation Arena Simulation could potentially let a thr…Mar 26, 2024›
CVE-2020-12027MEDIUM
4.3
All versions of FactoryTalk View SE disclose the hostnames and file paths for certain files within t…Jul 20, 2020›
CVE-2009-0472MEDIUM
4.3
Multiple cross-site scripting (XSS) vulnerabilities in the web interface in the Rockwell Automation …Feb 6, 2009›
CVE-2023-2639MEDIUM
4.1
The underlying feedback mechanism of Rockwell Automation's FactoryTalk System Services that transf…Jun 13, 2023›
CVE-2020-12025LOW
3.3
Rockwell Automation Logix Designer Studio 5000 Versions 32.00, 32.01, and 32.02 vulnerable to an xml…Jul 14, 2020›
CVE-2020-6980LOW
3.3
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, …Mar 16, 2020›
CVE-2019-13511LOW
3.3
Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain an INFORMATION E…Aug 15, 2019›
CVE-2016-9338LOW
2.7
An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA,…Feb 13, 2017›
CVE-2025-7353Awaiting Analysis
0.0
A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLo…Aug 14, 2025›
CVE-2025-1449Awaiting Analysis
0.0
A vulnerability exists in the Rockwell Automation Verve Asset Manager due to insufficient variable s…Mar 31, 2025›
CVE-2025-0659Awaiting Analysis
0.0
A path traversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Privat…Jan 28, 2025›
CVE-2024-12373Awaiting Analysis
0.0
A denial-of-service vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerab…Dec 18, 2024›
CVE-2024-12372Awaiting Analysis
0.0
A denial-of-service and possible remote code execution vulnerability exists in the Rockwell Automati…Dec 18, 2024›
CVE-2024-12371Awaiting Analysis
0.0
A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerabi…Dec 18, 2024›
CVE-2024-9412Awaiting Analysis
0.0
An improper authorization vulnerability exists in the Rockwell Automation affected products that cou…Oct 8, 2024›
CVE-2024-7567Awaiting Analysis
0.0
A denial-of-service vulnerability exists via the CIP/Modbus port in the Rockwell Automation Micro850…Aug 13, 2024›
CVE-2024-6079Awaiting Analysis
0.0
A vulnerability exists in the Rockwell Automation Emulate3D™, which could be leveraged to execute a …Aug 13, 2024›
CVE-2024-6242Awaiting Analysis
0.0
A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass…Aug 1, 2024›
CVE-2024-3640Awaiting Analysis
0.0
An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly r…May 16, 2024›