Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rockwellautomation vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2017-16740
A Buffer Overflow issue exists in Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers, Series B and C Versions 21.002 and previous versions. The stack-based buffer overflow vulnerability has been identified, which may allow remote code execution.
Rockwellautomation 1766-l32bxba Firmware
Rockwellautomation 1766-l32awa Firmware
Rockwellautomation 1766-l32bxb Firmware
Rockwellautomation 1766-l32bwaa Firmware
Rockwellautomation 1766-l32awaa Firmware
Rockwellautomation 1766-l32bwa Firmware
7.1
CVSSv2
CVE-2017-6024
A Resource Exhaustion issue exists in Rockwell Automation ControlLogix 5580 controllers V28.011, V28.012, and V28.013; ControlLogix 5580 controllers V29.011; CompactLogix 5380 controllers V28.011; and CompactLogix 5380 controllers V29.011. This vulnerability may allow an maliciou...
Rockwellautomation Compactlogix 5380 Firmware V28.011
Rockwellautomation Compactlogix 5380 Firmware V29.011
Rockwellautomation Controllogix 5580 Firmware V29.011
Rockwellautomation Controllogix 5580 Firmware V28.012
Rockwellautomation Controllogix 5580 Firmware V28.011
Rockwellautomation Controllogix 5580 Firmware V28.013
5
CVSSv2
CVE-2020-6984
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic function utilized to protect the password in MicroLogix is discoverable.
Rockwellautomation Micrologix 1400 A Firmware
Rockwellautomation Micrologix 1400 B Firmware
Rockwellautomation Micrologix 1100 Firmware
Rockwellautomation Rslogix 500
2.1
CVSSv2
CVE-2020-6980
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, If Simple Mail Transfer Protocol (SMTP) account data is saved in RSLogix 500, a local attacker wit...
Rockwellautomation Micrologix 1400 A Firmware
Rockwellautomation Micrologix 1400 B Firmware
Rockwellautomation Micrologix 1100 Firmware
Rockwellautomation Rslogix 500
5
CVSSv2
CVE-2020-6988
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim&...
Rockwellautomation Micrologix 1400 A Firmware
Rockwellautomation Micrologix 1400 B Firmware
Rockwellautomation Micrologix 1100 Firmware
Rockwellautomation Rslogix 500
10
CVSSv2
CVE-2020-6990
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic key utilized to help protect the account password is hard coded into the RSLogix...
Rockwellautomation Micrologix 1400 A Firmware
Rockwellautomation Micrologix 1400 B Firmware
Rockwellautomation Micrologix 1100 Firmware
Rockwellautomation Rslogix 500
4.3
CVSSv2
CVE-2020-12038
Products that use EDS Subsystem: Version 28.0.1 and prior (FactoryTalk Linx software (Previously called RSLinx Enterprise): Versions 6.00, 6.10, and 6.11, RSLinx Classic: Version 4.11.00 and prior, RSNetWorx software: Version 28.00.00 and prior, Studio 5000 Logix Designer softwar...
Rockwellautomation Eds Subsystem
Rockwellautomation Rslinx
Rockwellautomation Rslinx Enterprise 6.00.00
Rockwellautomation Rslinx Enterprise 6.10.00
Rockwellautomation Rslinx Enterprise 6.11.00
Rockwellautomation Rsnetworx
Rockwellautomation Studio 5000 Logix Designer
4.8
CVSSv2
CVE-2020-12034
Products that use EDS Subsystem: Version 28.0.1 and prior (FactoryTalk Linx software (Previously called RSLinx Enterprise): Versions 6.00, 6.10, and 6.11, RSLinx Classic: Version 4.11.00 and prior, RSNetWorx software: Version 28.00.00 and prior, Studio 5000 Logix Designer softwar...
Rockwellautomation Eds Subsystem
Rockwellautomation Rslinx
Rockwellautomation Rslinx Enterprise 6.00.00
Rockwellautomation Rslinx Enterprise 6.10.00
Rockwellautomation Rslinx Enterprise 6.11.00
Rockwellautomation Rsnetworx
Rockwellautomation Studio 5000 Logix Designer
7.8
CVSSv2
CVE-2013-2805
Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it receives a datagram with an incorrect value in the “Record Da...
Rockwellautomation Rslinx Enterprise 5.10.00
Rockwellautomation Rslinx Enterprise 5.51.00
Rockwellautomation Rslinx Enterprise 5.20.00
Rockwellautomation Rslinx Enterprise 5.21.00
Rockwellautomation Rslinx Enterprise 5.30.00
Rockwellautomation Rslinx Enterprise 5.40.00
Rockwellautomation Rslinx Enterprise 5.10.01
Rockwellautomation Rslinx Enterprise 5.50.00
Rockwellautomation Rslinx Enterprise 5.60.00
7.8
CVSSv2
CVE-2013-2806
Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the “End of Current Record&...
Rockwellautomation Rslinx Enterprise 5.30.00
Rockwellautomation Rslinx Enterprise 5.50.00
Rockwellautomation Rslinx Enterprise 5.60.00
Rockwellautomation Rslinx Enterprise 5.10.00
Rockwellautomation Rslinx Enterprise 5.10.01
Rockwellautomation Rslinx Enterprise 5.20.00
Rockwellautomation Rslinx Enterprise 5.21.00
Rockwellautomation Rslinx Enterprise 5.40.00
Rockwellautomation Rslinx Enterprise 5.51.00
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »