Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400
Rockwell Automation MicroLogix 1100 and 1400 controllers (models 1766-L32BXB, 1763-L16AWA, 1766-L32AWA, 1766-L32BXBA, 1766-L32BWA, 1763-L16BWA, 1763-L16DWD, 1763-L16BBB, 1766-L32AWAA, 1766-L32BWAA—Series A and B, all firmware versions <= 16.00) contain multiple authentication and data exposure flaws. An attacker with network access can connect to the PLC without credentials and read sensitive information (CWE-200, CWE-521), modify control parameters, or stop operations. The vulnerabilities stem from weak credential handling (CWE-307), lack of encryption (CWE-323), and improper security (CWE-343). Rockwell has not released patches and designates these products as end-of-life.
- Network access to Ethernet port on the PLC (typically port 502 or 2222)
- No valid credentials required
- Attacker must be able to reach the PLC IP address from network segment where it resides
Patching may require device reboot — plan for process interruption
/api/v1/advisories/645e0700-8cca-42e2-abfb-618188556d12Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.