Rockwell Automation MicroLogix 1400 and CompactLogix 5370 Controllers
A vulnerability in Rockwell Automation MicroLogix 1400 and CompactLogix 5370 controllers allows remote unauthenticated attackers to inject malicious links that could redirect users to malicious websites. The vulnerability affects MicroLogix 1400 Series A (all versions), MicroLogix 1400 Series B (v15.002 and earlier), MicroLogix 1100 (v14.00 and earlier), and CompactLogix 5370 L1/L2/L3 controllers (v30.014 and earlier, including CompactLogix GuardLogix variants). No patches are available from Rockwell Automation for any affected product line.
- Network access to the affected controller
- User must click a malicious link presented by the controller's interface or data
- Controller must be reachable from a network segment where operators or engineering staff access it
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bfa5c9fa-d5b2-44b2-874b-ab8972e243f7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.