Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Rockwell Automation — Vulnerabilities & Security Advisories 259

Browse all 259 CVE security advisories affecting Rockwell Automation. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Rockwell Automation specializes in industrial automation and information integration, providing critical control systems for manufacturing and process industries. Its software portfolio, including FactoryTalk and PlantPAx, manages complex operational technology environments, making it a high-value target for threat actors seeking to disrupt industrial infrastructure. Historical vulnerability data reveals a prevalence of remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from legacy components or insufficient input validation in web-based interfaces. Notable incidents include the 2018 discovery of backdoors in FactoryTalk View SE, which allowed unauthorized access to industrial control systems. These vulnerabilities highlight the persistent risk of insecure default configurations and unpatched legacy systems within industrial networks. The sheer volume of recorded CVEs underscores the complexity of securing interconnected OT/IT environments, where updates must balance operational continuity with rigorous security hygiene to prevent catastrophic physical or data breaches.

CVE IDTitleCVSSSeverityPublished
CVE-2019-6553 Rockwell Automation RSLinx Classic 缓冲区错误漏洞 — RSLinx ClassicCWE-121 9.8 -2019-04-04
CVE-2010-5305 Rockwell PLC5/SLC5/0x/RSLogix Credentials management — PLC5CWE-255 9.8 -2019-03-26
CVE-2013-2805 Rockwell Automation RSLinx Enterprise 缓冲区错误漏洞 — RSLinx Enterprise SoftwareCWE-125 7.5 -2019-03-26
CVE-2013-2806 Rockwell Automation RSLinx Enterprise 输入验证错误漏洞 — RSLinx Enterprise SoftwareCWE-190 7.5 -2019-03-26
CVE-2013-2807 Rockwell Automation RSLinx Enterprise 缓冲区错误漏洞 — RSLinx Enterprise SoftwareCWE-190 7.5 -2019-03-26
CVE-2018-14821 Rockwell Automation RSLinx Classic 安全漏洞 — RSLinx ClassicCWE-122 7.5 -2018-09-20
CVE-2018-14827 Rockwell Automation RSLinx Classic 安全漏洞 — RSLinx ClassicCWE-400 7.5 -2018-09-20
CVE-2018-14829 Rockwell Automation RSLinx Classic 安全漏洞 — RSLinx ClassicCWE-121 9.8 -2018-09-20
CVE-2017-6015 Rockwell Automation FactoryTalk Activation 安全漏洞 — FactoryTalk ActivationCWE-428 7.8 -2018-05-11
CVE-2014-5410 Rockwell Automation Micrologix 1400 Improper Input Validation — Allen-Bradley MicroLogix 1400CWE-20 7.5 -2014-10-03
CVE-2014-0755 Rockwell RSLogix 5000 Insufficiently Protected Credentials — RSLogix 5000 softwareCWE-522 7.1 -2014-02-05
CVE-2012-6435 Rockwell Automation ControlLogix PLC Improper Access Control — 1756-ENBT, 1756-EWEB, 1768-ENBT, 1768-EWEB communication modulesCWE-284 9.8 -2013-01-24
CVE-2012-6436 Rockwell Automation ControlLogix PLC Improper Input Validation — 1756-ENBT, 1756-EWEB, 1768-ENBT, 1768-EWEB communication modulesCWE-119 9.8 -2013-01-24
CVE-2012-6437 Rockwell Automation ControlLogix PLC Improper Authentication — 1756-ENBT, 1756-EWEB, 1768-ENBT, 1768-EWEB communication modulesCWE-287 9.8 -2013-01-24
CVE-2012-6438 Rockwell Automation ControlLogix PLC Improper Input Validation — 1756-ENBT, 1756-EWEB, 1768-ENBT, 1768-EWEB communication modulesCWE-119 9.8 -2013-01-24
CVE-2012-6439 Rockwell Automation ControlLogix PLC Improper Access Control — 1756-ENBT, 1756-EWEB, 1768-ENBT, 1768-EWEB communication modulesCWE-284 9.8 -2013-01-24
CVE-2012-6440 Rockwell Automation ControlLogix PLC Improper Input Validation — 1756-ENBT, 1756-EWEB, 1768-ENBT, 1768-EWEB communication modulesCWE-287 9.1 -2013-01-24
CVE-2012-6441 Rockwell Automation ControlLogix PLC Information Exposure — 1756-ENBT, 1756-EWEB, 1768-ENBT, 1768-EWEB communication modulesCWE-200 9.8 -2013-01-24
CVE-2012-6442 Rockwell Automation ControlLogix PLC Improper Access Control — 1756-ENBT, 1756-EWEB, 1768-ENBT, 1768-EWEB communication modulesCWE-284 9.8 -2013-01-24

This page lists every published CVE security advisory associated with Rockwell Automation. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.