Rockwellautomation Vulnerabilities

Comprehensive security vulnerability database for Rockwellautomation products

Last updated: Mar 3, 2021
Total CVEs

3

Critical

2

With Exploits

3

Last 30 Days

0

Severity Distribution

Critical2
67%
High1
33%
Medium0
0%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2021-226819.8

An attacker can gain unauthorized access to various Rockwell Automation controllers, allowing them to manipulate or control industrial processes without needing to authenticate. This vulnerability affects specific versions of Rockwell's software and requires no prior credentials, making it particularly dangerous for organizations using these systems.

rockwellautomationfactorytalk services platform
Exploit Available
about 5 years agoMar 3, 2021
CVE-2019-109529.8

An attacker can send a specially crafted web request to crash the CompactLogix 5370 controllers, making them unavailable, and potentially run malicious code on them. This vulnerability affects specific firmware versions and requires a cold restart to recover the device.

rockwellautomationcompactlogix 5370 l1 firmware
Exploit Available
almost 7 years agoMay 1, 2019
CVE-2019-109547.5

An attacker can send specially crafted email packets to a vulnerable Rockwell Automation controller, causing it to crash and enter a state where it cannot recover without a restart. This issue affects specific versions of the CompactLogix and GuardLogix controllers, so those using these devices should be aware of the risk.

rockwellautomationcompactlogix 5370 l1 firmware
Exploit Available
almost 7 years agoMay 1, 2019

About Rockwellautomation Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Rockwellautomation products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.