Rockwell Automation RSLogix 5 and RSLogix 500
Rockwell Automation RSLogix 5, RSLogix 500, and RSLogix Micro Developer and Starter contain a vulnerability in the Visual Basic for Applications (VBA) macro execution framework. An attacker could embed malicious VBA code within a RSLogix project file. When the project file is opened in RSLogix by an authorized user, the embedded VBA code executes with the privileges of the engineering workstation, allowing arbitrary code execution. This is particularly dangerous because engineering workstations typically have trusted access to industrial control networks and PLCs.
- Local or shared file access to the engineering workstation
- Target must open a malicious RSLogix project file (.rsx, .rs5, etc.)
- User interaction required (file must be opened)
- VBA execution must be enabled in FactoryTalk Administration Console (default state)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/94e7175a-24b1-4c09-891b-0227640300a8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.