Rockwell Automation Micro800
Rockwell Automation Micro800 PLCs contain vulnerabilities that could allow remote code execution without authentication or user interaction. Successful exploitation could enable an attacker to run arbitrary code on the PLC, potentially disrupting industrial processes or altering equipment behavior. The vulnerabilities affect multiple Micro800 product lines: Micro820 LC20 (no fix available, migration recommended), Micro850 LC50 (no fix available, migration recommended), Micro870 LC70 (no fix available, migration recommended), Micro850 L50E (fixed in V23.011), and Micro870 L70E (fixed in V23.011). Legacy LC-series models are end-of-life and will not receive security updates.
- Network access to the Micro800 PLC from an untrusted network segment
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2a0e7bed-079d-458e-8e5f-3b0c1dfac87bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.