Rockwell Automation has issued multiple security advisories this week detailing newly discovered critical and high-severity vulnerabilities in several of its products.
Critical flaws were found in FactoryTalk, Micro800, and ControlLogix systems. In FactoryTalk Linx Network Browser, the company fixed CVE-2025-7972, a flaw that could let attackers bypass FTSP token validation to create, update, or delete FTLinx drivers.
For Micro800 series PLCs, Rockwell addressed three older vulnerabilities in the open-source Azure RTOS, which could be exploited for remote code execution and privilege escalation, as well as a separate denial-of-service (DoS) issue.
ControlLogix products received a patch for a remote code execution flaw (CVE-2025-7353). Other high-severity fixes included two DoS flaws in FLEX 5000, a code execution bug in Studio 5000 Logix Designer, web server vulnerabilities in ArmorBlock 5000, a privilege escalation in FactoryTalk ViewPoint, and an information exposure issue in FactoryTalk Action Manager.
Rockwell confirmed there is no evidence of active exploitation, while CISA has released advisories to help organizations understand the potential risks.
Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post.