- Description
- Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
- Products
- factorytalk_services_platform, rslogix_5000, studio_5000_logix_designer
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Data from CISA
- Vulnerability name
- Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Exploit added on
- Mar 5, 2026
- Exploit action due
- Mar 26, 2026
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Hype score
- Not currently trending
🚨 BREAKING: CISA adds FIVE new vulnerabilities to its Known Exploited Vulnerabilities Catalog! 🚨 🔍 CVE-2017-7921: Hikvision Improper Authentication 🔍 CVE-2021-22681: Rockwell Insufficient Protected Credentials 🔍 CVE-2021-30952: Apple Integer Overflow 🔍 CVE-2023
@NewsNerdie
17 Mar 2026
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
米国サイバーセキュリティ・社会基盤安全保障庁(CISA)が既知の悪用された脆弱性カタログに5件の脆弱性を追加。ハイクビジョンのCVE-2017-7921、Rockwell Automation製品のCVE-2021-22681、Apple製品のCVE-2021-30952、CVE-2023-4197
@__kokumoto
5 Mar 2026
822 Impressions
0 Retweets
2 Likes
1 Bookmark
1 Reply
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockwellautomation:factorytalk_services_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6755FCF6-4A0C-478A-AEFF-54E35C45149D",
"versionStartIncluding": "2.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rockwellautomation:rslogix_5000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04C30129-3F03-4486-B181-EBDE29751372",
"versionEndIncluding": "20",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rockwellautomation:studio_5000_logix_designer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C840463-A11F-43A0-AA45-1AC810713AB6",
"versionStartIncluding": "21.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rockwellautomation:compact_guardlogix_5370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F951670-AF4D-4429-8BC1-79BDEF83B2C3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62414E65-73C7-4172-B7BF-F40A66AFBB90",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:compactlogix_1768:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E5F100A-C8A3-49F2-B1D2-411432472B6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:compactlogix_1769:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8A690BC-4D7C-4B83-A9F6-F860445028A2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E12ADAE3-97B1-48BC-BE69-ED75667C1886",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD040ED-B44C-47D0-B4D4-729C378C4F68",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80F4F5BE-07DF-402A-BF98-34FBA6A11968",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:controllogix_5550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13EE2216-F25F-44AB-A167-4EEA153C8F8D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:controllogix_5560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA25FF8D-51C5-4928-9B90-E4BD1476F50B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:controllogix_5570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "482E2CD6-D484-486C-92F4-18432D107E30",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:controllogix_5580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51BB883B-B863-4D57-B1C0-FC7B3EBD1EA0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:drivelogix_1794-l34:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A75A0FD-C337-4264-B1E4-96701851D6FA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:drivelogix_5560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDAAA77-6964-44FC-9FFB-ECDF71665965",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:drivelogix_5730:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03E185C3-17CA-4E3F-863B-9F906C5C59EA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:guardlogix_5570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "321AE938-192A-4342-8608-ADC81F0B6582",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "006B7683-9FDF-4748-BA28-2EA22613E092",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:rockwellautomation:softlogix_5800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDAB7B6D-CCAC-460B-8A88-3397A2397078",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
]