Rockwell Automation MicroLogix 1100 and 1400
The MicroLogix 1100 and 1400 programmable logic controllers contain vulnerabilities in the web server component (CWE-79, CWE-1021) that could enable remote denial-of-service attacks or remote code execution. The vulnerabilities exist across all MicroLogix 1100 versions and affect MicroLogix 1400 models up to version 21.007. The web server is an optional feature and is exposed to attackers with network access to port 802 (HTTP). Rockwell Automation has not released a firmware patch and recommends disabling the web server or upgrading to MicroLogix 800/850 series as mitigations.
- Network access to TCP port 802 (HTTP) on the MicroLogix device
- Web server component must be enabled (default state)
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/dca21722-d12e-4110-8349-359b3255985bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.