AID
Automation
Information Directory
HomeCVE FeedBrands
AID
Automation Information Directory
CVE data sourced from NIST NVD · Documentation links from official sources
Home›Brands›Rockwell Automation
RO
Platform

Rockwell Automation

Global leader in industrial automation and digital transformation. Products include Allen-Bradley PLCs, PowerFlex drives, FactoryTalk software, and Stratix networking.

https://www.rockwellautomation.com →
247
Total CVEs
12
Resources
49
CRIT
140
HIGH
43
MED
4
LOW
CVEsCVEsSpecsTech SpecsDocsTech DocsImplImplementationsExamplesExamples
49 / 247
CVE-2021-27476CRITICAL

A vulnerability exists in the SaveConfigFile function of the RACompare Service, which may allow for OS command injection. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier.

Mar 23, 2022
10.0
CVE-2021-27474CRITICAL

Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier does not properly restrict all functions relating to IIS remoting services. This vulnerability may allow a remote, unauthenticated attacker to modify sensitive data in FactoryTalk AssetCentre.

Mar 23, 2022
10.0
CVE-2021-27472CRITICAL

A vulnerability exists in the RunSearch function of SearchService service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier, which may allow for the execution of remote unauthenticated arbitrary SQL statements.

Mar 23, 2022
10.0
CVE-2021-27470CRITICAL

A deserialization vulnerability exists in how the LogService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.

Mar 23, 2022
10.0
CVE-2021-27468CRITICAL

The AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements.

Mar 23, 2022
10.0
CVE-2021-27466CRITICAL

A deserialization vulnerability exists in how the ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.

Mar 23, 2022
10.0
CVE-2021-27464CRITICAL

The ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements.

Mar 23, 2022
10.0
CVE-2021-27462CRITICAL

A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.

Mar 23, 2022
10.0
CVE-2021-27460CRITICAL

Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier components contain .NET remoting endpoints that deserialize untrusted data without sufficiently verifying that the resulting data will be valid. This vulnerability may allow a remote, unauthenticated attacker to gain full access to the FactoryTalk AssetCentre main server and all agent machines.

Mar 23, 2022
10.0
CVE-2020-14516CRITICAL

In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly.

Mar 18, 2021
10.0
CVE-2017-16740CRITICAL

A Buffer Overflow issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers, Series B and C Versions 21.002 and earlier. The stack-based buffer overflow vulnerability has been identified, which may allow remote code execution.

Jan 9, 2018
10.0
CVE-2016-9343CRITICAL

An issue was discovered in Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.00 through 21.00 (excluding all firmware versions prior to FRN 16.00, which are not affected). By sending malformed common industrial protocol (CIP) packet, an attacker may be able to overflow a stack-based buffer and execute code on the controller or initiate a nonrecoverable fault resulting in a denial of service.

Feb 13, 2017
10.0
CVE-2025-0498CRITICAL

A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to insecure storage of FactoryTalk® Security user tokens, which could allow a threat actor to steal a token and, impersonate another user.

Jan 30, 2025
9.8
CVE-2025-0497CRITICAL

A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to storing credentials in the configuration file of EventLogAttachmentExtractor, ArchiveExtractor, LogCleanUp, or ArchiveLogCleanUp packages.

Jan 30, 2025
9.8
CVE-2025-0477CRITICAL

An encryption vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to a weak encryption methodology and could allow a threat actor to extract passwords belonging to other users of the application.

Jan 30, 2025
9.8
CVE-2024-7961CRITICAL

A path traversal vulnerability exists in the Rockwell Automation affected product. If exploited, the threat actor could upload arbitrary files to the server that could result in a remote code execution.

Sep 12, 2024
9.8
CVE-2024-7988CRITICAL

A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ that allows a threat actor to execute arbitrary code with System privileges. This vulnerability exists due to the lack of proper data input validation, which allows files to be overwritten.

Aug 26, 2024
9.8
CVE-2024-5989CRITICAL

Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.

Jun 25, 2024
9.8
CVE-2024-5988CRITICAL

Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke a local or remote executable and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.

Jun 25, 2024
9.8
CVE-2024-4609CRITICAL

A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could allow a threat actor to inject a malicious SQL statement if the SQL database has no authentication in place or if legitimate credentials were stolen. If exploited, the attack could result in information exposure, revealing sensitive information. Additionally, a threat actor could potentially modify and delete the data in a remote database. An attack would only affect the HMI design time, not runtime.

May 16, 2024
9.8
CVE-2024-21917CRITICAL

A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious user to obtain the service token and use it for authentication on another FTSP directory. This is due to the lack of digital signing between the FTSP service token and directory.  If exploited, a malicious user could potentially retrieve user information and modify settings without any authentication.

Jan 31, 2024
9.8
CVE-2023-2262CRITICAL

A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.

Sep 20, 2023
9.8
CVE-2023-2071CRITICAL

Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets.  The device has the functionality, through a CIP class, to execute exported functions from libraries.  There is a routine that restricts it to execute specific functions from two dynamic link library files.  By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.

Sep 12, 2023
9.8
CVE-2023-2917CRITICAL

The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability.  Due to an improper input validation, a path traversal vulnerability exists, via the filename field, when the ThinManager processes a certain function. If exploited, an unauthenticated remote attacker can upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed.  A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and potentially gain remote code execution abilities.

Aug 17, 2023
9.8
CVE-2023-3595CRITICAL

Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.

Jul 12, 2023
9.8
CVE-2023-27855CRITICAL

In affected versions, a path traversal exists when processing a message in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution.

Mar 22, 2023
9.8
CVE-2021-22681CRITICAL

Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.

Mar 3, 2021
9.8
CVE-2020-27265CRITICAL

KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions are vulnerable to a stack-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and remotely execute code.

Jan 14, 2021
9.8
CVE-2020-6967CRITICAL

In Rockwell Automation all versions of FactoryTalk Diagnostics software, a subsystem of the FactoryTalk Services Platform, FactoryTalk Diagnostics exposes a .NET Remoting endpoint via RNADiagnosticsSrv.exe at TCPtcp/8082, which can insecurely deserialize untrusted data.

Mar 23, 2020
9.8
CVE-2020-6990CRITICAL

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic key utilized to help protect the account password is hard coded into the RSLogix 500 binary file. An attacker could identify cryptographic keys and use it for further cryptographic attacks that could ultimately lead to a remote attacker gaining unauthorized access to the controller.

Mar 16, 2020
9.8
CVE-2019-10970CRITICAL

In Rockwell Automation PanelView 5510 (all versions manufactured before March 13, 2019 that have never been updated to v4.003, v5.002, or later), a remote, unauthenticated threat actor with access to an affected PanelView 5510 Graphic Display, upon successful exploit, may boot-up the terminal and gain root-level access to the device’s file system.

Jul 11, 2019
9.8
CVE-2018-19282CRITICAL

Rockwell Automation PowerFlex 525 AC Drives 5.001 and earlier allow remote attackers to cause a denial of service by crashing the Common Industrial Protocol (CIP) network stack. The vulnerability allows the attacker to crash the CIP in a way that it does not accept new connections, but keeps the current connections active, which can prevent legitimate users from recovering control.

Apr 4, 2019
9.8
CVE-2019-6553CRITICAL

A vulnerability was found in Rockwell Automation RSLinx Classic versions 4.10.00 and prior. An input validation issue in a .dll file of RSLinx Classic where the data in a Forward Open service request is passed to a fixed size buffer, allowing an attacker to exploit a stack-based buffer overflow condition.

Apr 4, 2019
9.8
CVE-2010-5305CRITICAL

The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product’s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services.

Mar 26, 2019
9.8
CVE-2018-14829CRITICAL

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.

Sep 20, 2018
9.8
CVE-2017-7903CRITICAL

A Weak Password Requirements issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected products use a numeric password with a small maximum character size for the password.

Jun 30, 2017
9.8
CVE-2017-7902CRITICAL

A "Reusing a Nonce, Key Pair in Encryption" issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected product reuses nonces, which may allow an attacker to capture and replay a valid request until the nonce is changed.

Jun 30, 2017
9.8
CVE-2017-7899CRITICAL

An Information Exposure issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. User credentials are sent to the web server using the HTTP GET method, which may result in the credentials being logged. This could make user credentials available for unauthorized retrieval.

Jun 30, 2017
9.8
CVE-2017-7898CRITICAL

An Improper Restriction of Excessive Authentication Attempts issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. There are no penalties for repeatedly entering incorrect passwords.

Jun 30, 2017
9.8
CVE-2016-4522CRITICAL

SQL injection vulnerability in Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

Jul 28, 2016
9.8
CVE-2016-0868CRITICAL

Stack-based buffer overflow on Rockwell Automation Allen-Bradley MicroLogix 1100 devices A through 15.000 and B before 15.002 allows remote attackers to execute arbitrary code via a crafted web request.

Jan 28, 2016
9.8
CVE-2023-2746CRITICAL

The Rockwell Automation Enhanced HIM software contains an API that the application uses that is not protected sufficiently and uses incorrect Cross-Origin Resource Sharing (CORS) settings and, as a result, is vulnerable to a Cross Site Request Forgery (CSRF) attack. To exploit this vulnerability, a malicious user would have to convince a user to click on an untrusted link through a social engineering attack or successfully perform a Cross Site Scripting Attack (XSS). Exploitation of a CSRF could potentially lead to sensitive information disclosure and full remote access to the affected products.

Jul 11, 2023
9.6
CVE-2023-1834CRITICAL

Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running v7.13 may have the telnet and FTP ports open by default.  This could potentially allow attackers unauthorized access to the device through the open ports.

May 11, 2023
9.4
CVE-2024-7960CRITICAL

The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to having an incorrect privilege matrix that allows users to have access to functions they should not.

Sep 12, 2024
9.1
CVE-2020-25176CRITICAL

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

Mar 18, 2022
9.1
CVE-2020-27267CRITICAL

KEPServerEX v6.0 to v6.9, ThingWorx Kepware Server v6.8 and v6.9, ThingWorx Industrial Connectivity (all versions), OPC-Aggregator (all versions), Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server v7.68.804 and v7.66, and Software Toolbox TOP Server all 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.

Jan 14, 2021
9.1
CVE-2020-27263CRITICAL

KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.

Jan 14, 2021
9.1
CVE-2024-21915CRITICAL

A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable.

Feb 16, 2024
9.0
CVE-2020-12029CRITICAL

All versions of FactoryTalk View SE do not properly validate input of filenames within a project directory. A remote, unauthenticated attacker may be able to execute a crafted file on a remote endpoint that may result in remote code execution (RCE). Rockwell Automation recommends applying patch 1126289. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.

Jul 20, 2020
9.0
CVE ID ⇅Severity ↓CVSS ⇅DescriptionPublished ⇅
CVE-2021-27476CRITICAL
10.0
A vulnerability exists in the SaveConfigFile function of the RACompare Service, which may allow for …Mar 23, 2022›
CVE-2021-27474CRITICAL
10.0
Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier does not properly restrict all functi…Mar 23, 2022›
CVE-2021-27472CRITICAL
10.0
A vulnerability exists in the RunSearch function of SearchService service in Rockwell Automation Fac…Mar 23, 2022›
CVE-2021-27470CRITICAL
10.0
A deserialization vulnerability exists in how the LogService.rem service in Rockwell Automation Fact…Mar 23, 2022›
CVE-2021-27468CRITICAL
10.0
The AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes…Mar 23, 2022›
CVE-2021-27466CRITICAL
10.0
A deserialization vulnerability exists in how the ArchiveService.rem service in Rockwell Automation …Mar 23, 2022›
CVE-2021-27464CRITICAL
10.0
The ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exp…Mar 23, 2022›
CVE-2021-27462CRITICAL
10.0
A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation Fact…Mar 23, 2022›
CVE-2021-27460CRITICAL
10.0
Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier components contain .NET remoting endp…Mar 23, 2022›
CVE-2020-14516CRITICAL
10.0
In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue…Mar 18, 2021›
CVE-2017-16740CRITICAL
10.0
A Buffer Overflow issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1400 Controll…Jan 9, 2018›
CVE-2016-9343CRITICAL
10.0
An issue was discovered in Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.0…Feb 13, 2017›
CVE-2025-0498CRITICAL
9.8
A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation Fact…Jan 30, 2025›
CVE-2025-0497CRITICAL
9.8
A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation Fact…Jan 30, 2025›
CVE-2025-0477CRITICAL
9.8
An encryption vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation Factor…Jan 30, 2025›
CVE-2024-7961CRITICAL
9.8
A path traversal vulnerability exists in the Rockwell Automation affected product. If exploited, th…Sep 12, 2024›
CVE-2024-7988CRITICAL
9.8
A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ tha…Aug 26, 2024›
CVE-2024-5989CRITICAL
9.8
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to…Jun 25, 2024›
CVE-2024-5988CRITICAL
9.8
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to…Jun 25, 2024›
CVE-2024-4609CRITICAL
9.8
A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could a…May 16, 2024›
CVE-2024-21917CRITICAL
9.8
A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious …Jan 31, 2024›
CVE-2023-2262CRITICAL
9.8
A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication d…Sep 20, 2023›
CVE-2023-2071CRITICAL
9.8
Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies use…Sep 12, 2023›
CVE-2023-2917CRITICAL
9.8
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerabi…Aug 17, 2023›
CVE-2023-3595CRITICAL
9.8
Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix com…Jul 12, 2023›
CVE-2023-27855CRITICAL
9.8
In affected versions, a path traversal exists when processing a message in Rockwell Automation's Th…Mar 22, 2023›
CVE-2021-22681CRITICAL
9.8
Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 t…Mar 3, 2021›
CVE-2020-27265CRITICAL
9.8
KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivit…Jan 14, 2021›
CVE-2020-6967CRITICAL
9.8
In Rockwell Automation all versions of FactoryTalk Diagnostics software, a subsystem of the FactoryT…Mar 23, 2020›
CVE-2020-6990CRITICAL
9.8
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, …Mar 16, 2020›
CVE-2019-10970CRITICAL
9.8
In Rockwell Automation PanelView 5510 (all versions manufactured before March 13, 2019 that have nev…Jul 11, 2019›
CVE-2018-19282CRITICAL
9.8
Rockwell Automation PowerFlex 525 AC Drives 5.001 and earlier allow remote attackers to cause a deni…Apr 4, 2019›
CVE-2019-6553CRITICAL
9.8
A vulnerability was found in Rockwell Automation RSLinx Classic versions 4.10.00 and prior. An input…Apr 4, 2019›
CVE-2010-5305CRITICAL
9.8
The potential exists for exposure of the product's password used to restrict unauthorized access to …Mar 26, 2019›
CVE-2018-14829CRITICAL
9.8
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote…Sep 20, 2018›
CVE-2017-7903CRITICAL
9.8
A Weak Password Requirements issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 11…Jun 30, 2017›
CVE-2017-7902CRITICAL
9.8
A "Reusing a Nonce, Key Pair in Encryption" issue was discovered in Rockwell Automation Allen-Bradle…Jun 30, 2017›
CVE-2017-7899CRITICAL
9.8
An Information Exposure issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 pr…Jun 30, 2017›
CVE-2017-7898CRITICAL
9.8
An Improper Restriction of Excessive Authentication Attempts issue was discovered in Rockwell Automa…Jun 30, 2017›
CVE-2016-4522CRITICAL
9.8
SQL injection vulnerability in Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 allows re…Jul 28, 2016›
CVE-2016-0868CRITICAL
9.8
Stack-based buffer overflow on Rockwell Automation Allen-Bradley MicroLogix 1100 devices A through 1…Jan 28, 2016›
CVE-2023-2746CRITICAL
9.6
The Rockwell Automation Enhanced HIM software contains an API that the application uses that is no…Jul 11, 2023›
CVE-2023-1834CRITICAL
9.4
Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and Janu…May 11, 2023›
CVE-2024-7960CRITICAL
9.1
The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view…Sep 12, 2024›
CVE-2020-25176CRITICAL
9.1
Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (I…Mar 18, 2022›
CVE-2020-27267CRITICAL
9.1
KEPServerEX v6.0 to v6.9, ThingWorx Kepware Server v6.8 and v6.9, ThingWorx Industrial Connectivity …Jan 14, 2021›
CVE-2020-27263CRITICAL
9.1
KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivit…Jan 14, 2021›
CVE-2024-21915CRITICAL
9.0
A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (F…Feb 16, 2024›
CVE-2020-12029CRITICAL
9.0
All versions of FactoryTalk View SE do not properly validate input of filenames within a project dir…Jul 20, 2020›