Rockwell Automation 440G TLS-Z
A code injection vulnerability (CWE-74) exists in Rockwell Automation's 440G TLS-Z load tap changer controller affecting all versions of the third-party local code and device firmware v6.001. Successful exploitation allows an attacker to execute arbitrary code and take over the device. The vulnerability requires local physical access, valid user credentials, and involves high attack complexity. Rockwell Automation has not released patches and will not provide fixes for this end-of-life product. No public exploitation has been reported.
- Physical access to the 440G TLS-Z device
- Valid user credentials for device login
- Local execution context on the device or connected engineering workstation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9f4dcddc-db36-4a4c-bc15-8ce7d5c84ddaGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.