Emerson ROC800 Series RTU and DL8000 Preset Controller
An authentication bypass vulnerability in Emerson ROC800 series RTUs and DL8000 preset controllers (CWE-305) allows an attacker with network access to send unauthorized control commands to the device without providing valid credentials or authentication tokens. Successful exploitation could result in denial-of-service or unauthorized modification of process parameters and control settings. The vulnerability affects all firmware versions of ROC809, ROC827, ROC809L, ROC827L, and DL8000 devices across all hardware revisions.
- Network access to the device on ports used by ROC800/DL8000 protocols (typically Modbus TCP or proprietary Emerson protocols)
- Device must be reachable from attacker's network position
- No valid credentials or prior access required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4ab0ce9f-0ee5-4a20-83f9-34b42c1c1bf3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.