AID
Automation
Information Directory
HomeCVE FeedBrands
AID
Automation Information Directory
CVE data sourced from NIST NVD · Documentation links from official sources
Home›Brands›Rockwell Automation
RO
Platform

Rockwell Automation

Global leader in industrial automation and digital transformation. Products include Allen-Bradley PLCs, PowerFlex drives, FactoryTalk software, and Stratix networking.

https://www.rockwellautomation.com →
247
Total CVEs
12
Resources
49
CRIT
140
HIGH
43
MED
4
LOW
CVEsCVEsSpecsTech SpecsDocsTech DocsImplImplementationsExamplesExamples
43 / 247
CVE-2014-9204MEDIUM

Stack-based buffer overflow in OPCTest.exe in Rockwell Automation RSLinx Classic before 3.73.00 allows remote attackers to execute arbitrary code via a crafted CSV file.

May 17, 2015
6.9
CVE-2014-9209MEDIUM

Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryTalk Services Platform before 2.71.00 and FactoryTalk View Studio 8.00.00 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

Mar 31, 2015
6.9
CVE-2011-2957MEDIUM

Unspecified vulnerability in Rockwell Automation FactoryTalk Diagnostics Viewer before V2.30.00 (CPR9 SR3) allows local users to execute arbitrary code via a crafted FactoryTalk Diagnostics Viewer (.ftd) configuration file, which triggers memory corruption.

Jul 28, 2011
6.9
CVE-2022-1797MEDIUM

A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online.

Jun 2, 2022
6.8
CVE-2009-0473MEDIUM

Open redirect vulnerability in the web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

Feb 6, 2009
6.8
CVE-2024-11158MEDIUM

An “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable before it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 5, 2024
6.7
CVE-2020-25182MEDIUM

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.

Mar 18, 2022
6.7
CVE-2024-6436MEDIUM

An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.

Sep 27, 2024
6.5
CVE-2024-6325MEDIUM

The v6.40 release of Rockwell Automation FactoryTalk® Policy Manager CVE-2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html  by implementing CIP security and did not update to the versions of the software CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html  and CVE-2022-1161. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html

Jul 16, 2024
6.5
CVE-2024-5659MEDIUM

Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the same network to result in a major nonrecoverable fault(MNRF/Assert). This vulnerability could be exploited by sending abnormal packets to the mDNS port. If exploited, the availability of the device would be compromised.

Jun 14, 2024
6.5
CVE-2022-2179MEDIUM

The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks.

Jul 20, 2022
6.5
CVE-2016-2277MEDIUM

IAB.exe in Rockwell Automation Integrated Architecture Builder (IAB) before 9.6.0.8 and 9.7.x before 9.7.0.2 allows remote attackers to execute arbitrary code via a crafted project file.

Apr 6, 2016
6.3
CVE-2014-0755MEDIUM

Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password protection for .ACD files (aka project files), which allows local users to obtain sensitive information or modify data via unspecified vectors.

Feb 5, 2014
6.3
CVE-2022-2463MEDIUM

Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. A crafted malicious .7z exchange file may allow an attacker to gain the privileges of the ISaGRAF Workbench software when opened. If the software is running at the SYSTEM level, then the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.

Aug 25, 2022
6.1
CVE-2021-27473MEDIUM

Rockwell Automation Connected Components Workbench v12.00.00 and prior does not sanitize paths specified within the .ccwarc archive file during extraction. This type of vulnerability is also commonly referred to as a Zip Slip. A local, authenticated attacker can create a malicious .ccwarc archive file that, when opened by Connected Components Workbench, will allow the attacker to gain the privileges of the software. If the software is running at SYSTEM level, the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.

Mar 23, 2022
6.1
CVE-2019-10955MEDIUM

In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earlier, MicroLogix 1100 Controllers v14.00 and earlier, CompactLogix 5370 L1 controllers v30.014 and earlier, CompactLogix 5370 L2 controllers v30.014 and earlier, CompactLogix 5370 L3 controllers (includes CompactLogix GuardLogix controllers) v30.014 and earlier, an open redirect vulnerability could allow a remote unauthenticated attacker to input a malicious link to redirect users to a malicious site that could run or download arbitrary malware on the user’s machine.

Apr 25, 2019
6.1
CVE-2018-19615MEDIUM

Rockwell Automation Allen-Bradley PowerMonitor 1000 all versions. A remote attacker could inject arbitrary code into a targeted user’s web browser to gain access to the affected device.

Dec 26, 2018
6.1
CVE-2016-2279MEDIUM

Cross-site scripting (XSS) vulnerability in the web server in Rockwell Automation Allen-Bradley CompactLogix 1769-L* before 28.011+ allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Mar 2, 2016
6.1
CVE-2023-2638MEDIUM

Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected.   Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives.  This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.

Jun 13, 2023
5.9
CVE-2017-6024MEDIUM

A Resource Exhaustion issue was discovered in Rockwell Automation ControlLogix 5580 controllers V28.011, V28.012, and V28.013; ControlLogix 5580 controllers V29.011; CompactLogix 5380 controllers V28.011; and CompactLogix 5380 controllers V29.011. This vulnerability may allow an attacker to cause a denial of service condition by sending a series of specific CIP-based commands to the controller.

May 6, 2017
5.9
CVE-2020-6998MEDIUM

The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop. This may allow an attacker to send specially crafted CIP packet requests to a controller, which may cause denial-of-service conditions in communications with other products.

Jul 27, 2022
5.8
CVE-2025-3618MEDIUM

A denial-of-service vulnerability exists in the Rockwell Automation ThinManager. The software fails to adequately verify the outcome of memory allocation while processing Type 18 messages. If exploited, a threat actor could cause a denial-of-service on the target software.

Apr 15, 2025
5.5
CVE-2024-6326MEDIUM

An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk® System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, which temporarily exposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network.

Jul 16, 2024
5.5
CVE-2023-29024MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product A cross site scripting vulnerability was discovered that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.

May 11, 2023
5.5
CVE-2018-8843MEDIUM

Rockwell Automation Arena versions 15.10.00 and prior contains a use after free vulnerability caused by processing specially crafted Arena Simulation Software files that may cause the software application to crash, potentially losing any unsaved data..

May 14, 2018
5.5
CVE-2024-21914MEDIUM

A vulnerability exists in the affected product that allows a malicious user to restart the Rockwell Automation PanelView™ Plus 7 terminal remotely without security protections. If the vulnerability is exploited, it could lead to the loss of view or control of the PanelView™ product.

Mar 25, 2024
5.3
CVE-2023-0027MEDIUM

Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected device’s Modbus TCP Server AOI information.

Mar 17, 2023
5.3
CVE-2020-25180MEDIUM

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.

Mar 18, 2022
5.3
CVE-2012-6441MEDIUM

An information exposure of confidential information results when the device receives a specially crafted CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP. Successful exploitation of this vulnerability could cause loss of confidentiality. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
5.0
CVE-2012-0222MEDIUM

The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet.

Apr 2, 2012
5.0
CVE-2012-0221MEDIUM

The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 does not properly handle the return value from an unspecified function, which allows remote attackers to cause a denial of service (service outage) via a crafted packet.

Apr 2, 2012
5.0
CVE-2009-0474MEDIUM

The web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allows remote attackers to obtain "internal web page information" and "internal information about the module" via unspecified vectors. NOTE: this may overlap CVE-2002-1603.

Feb 6, 2009
5.0
CVE-2015-1010MEDIUM

Rockwell Automation RSView32 7.60.00 (aka CPR9 SR4) and earlier does not properly encrypt credentials, which allows local users to obtain sensitive information by reading a file and conducting a decryption attack.

May 31, 2015
4.9
CVE-2023-29029MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29028MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29027MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29026MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29025MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29022MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2024-21920MEDIUM

A memory buffer vulnerability in Rockwell Automation Arena Simulation could potentially let a threat actor read beyond the intended memory boundaries. This could reveal sensitive information and even cause the application to crash, resulting in a denial-of-service condition. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
4.4
CVE-2020-12027MEDIUM

All versions of FactoryTalk View SE disclose the hostnames and file paths for certain files within the system. A remote, authenticated attacker may be able to leverage this information for reconnaissance efforts. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs.

Jul 20, 2020
4.3
CVE-2009-0472MEDIUM

Multiple cross-site scripting (XSS) vulnerabilities in the web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Feb 6, 2009
4.3
CVE-2023-2639MEDIUM

The underlying feedback mechanism of Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.  This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy. 

Jun 13, 2023
4.1
CVE ID ⇅Severity ↓CVSS ⇅DescriptionPublished ⇅
CVE-2014-9204MEDIUM
6.9
Stack-based buffer overflow in OPCTest.exe in Rockwell Automation RSLinx Classic before 3.73.00 allo…May 17, 2015›
CVE-2014-9209MEDIUM
6.9
Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryT…Mar 31, 2015›
CVE-2011-2957MEDIUM
6.9
Unspecified vulnerability in Rockwell Automation FactoryTalk Diagnostics Viewer before V2.30.00 (CPR…Jul 28, 2011›
CVE-2022-1797MEDIUM
6.8
A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-o…Jun 2, 2022›
CVE-2009-0473MEDIUM
6.8
Open redirect vulnerability in the web interface in the Rockwell Automation ControlLogix 1756-ENBT/A…Feb 6, 2009›
CVE-2024-11158MEDIUM
6.7
An “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® …Dec 5, 2024›
CVE-2020-25182MEDIUM
6.7
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libr…Mar 18, 2022›
CVE-2024-6436MEDIUM
6.5
An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could al…Sep 27, 2024›
CVE-2024-6325MEDIUM
6.5
The v6.40 release of Rockwell Automation FactoryTalk® Policy Manager CVE-2021-22681 https://www.rock…Jul 16, 2024›
CVE-2024-5659MEDIUM
6.5
Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the sa…Jun 14, 2024›
CVE-2022-2179MEDIUM
6.5
The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is …Jul 20, 2022›
CVE-2016-2277MEDIUM
6.3
IAB.exe in Rockwell Automation Integrated Architecture Builder (IAB) before 9.6.0.8 and 9.7.x before…Apr 6, 2016›
CVE-2014-0755MEDIUM
6.3
Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password pro…Feb 5, 2014›
CVE-2022-2463MEDIUM
6.1
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Tra…Aug 25, 2022›
CVE-2021-27473MEDIUM
6.1
Rockwell Automation Connected Components Workbench v12.00.00 and prior does not sanitize paths speci…Mar 23, 2022›
CVE-2019-10955MEDIUM
6.1
In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earl…Apr 25, 2019›
CVE-2018-19615MEDIUM
6.1
Rockwell Automation Allen-Bradley PowerMonitor 1000 all versions. A remote attacker could inject arb…Dec 26, 2018›
CVE-2016-2279MEDIUM
6.1
Cross-site scripting (XSS) vulnerability in the web server in Rockwell Automation Allen-Bradley Comp…Mar 2, 2016›
CVE-2023-2638MEDIUM
5.9
Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archi…Jun 13, 2023›
CVE-2017-6024MEDIUM
5.9
A Resource Exhaustion issue was discovered in Rockwell Automation ControlLogix 5580 controllers V28.…May 6, 2017›
CVE-2020-6998MEDIUM
5.8
The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLog…Jul 27, 2022›
CVE-2025-3618MEDIUM
5.5
A denial-of-service vulnerability exists in the Rockwell Automation ThinManager. The software fails …Apr 15, 2025›
CVE-2024-6326MEDIUM
5.5
An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk® Sy…Jul 16, 2024›
CVE-2023-29024MEDIUM
5.5
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2018-8843MEDIUM
5.5
Rockwell Automation Arena versions 15.10.00 and prior contains a use after free vulnerability caused…May 14, 2018›
CVE-2024-21914MEDIUM
5.3
A vulnerability exists in the affected product that allows a malicious user to restart the Rockwell…Mar 25, 2024›
CVE-2023-0027MEDIUM
5.3
Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sen…Mar 17, 2023›
CVE-2020-25180MEDIUM
5.3
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a pas…Mar 18, 2022›
CVE-2012-6441MEDIUM
5.0
An information exposure of confidential information results when the device receives a specially cra…Jan 24, 2013›
CVE-2012-0222MEDIUM
5.0
The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 t…Apr 2, 2012›
CVE-2012-0221MEDIUM
5.0
The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 t…Apr 2, 2012›
CVE-2009-0474MEDIUM
5.0
The web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allo…Feb 6, 2009›
CVE-2015-1010MEDIUM
4.9
Rockwell Automation RSView32 7.60.00 (aka CPR9 SR4) and earlier does not properly encrypt credential…May 31, 2015›
CVE-2023-29029MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29028MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29027MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29026MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29025MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29022MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2024-21920MEDIUM
4.4
A memory buffer vulnerability in Rockwell Automation Arena Simulation could potentially let a thr…Mar 26, 2024›
CVE-2020-12027MEDIUM
4.3
All versions of FactoryTalk View SE disclose the hostnames and file paths for certain files within t…Jul 20, 2020›
CVE-2009-0472MEDIUM
4.3
Multiple cross-site scripting (XSS) vulnerabilities in the web interface in the Rockwell Automation …Feb 6, 2009›
CVE-2023-2639MEDIUM
4.1
The underlying feedback mechanism of Rockwell Automation's FactoryTalk System Services that transf…Jun 13, 2023›