Help
  • FAQ
    browse most common questions
  • Live Chat
    talk with our online service
  • Email
    contact your dedicated sales:
0

Rockwell PLC Authentication and Communication Vulnerabilities

Author : AIVON March 02, 2026

Content

 

Overview

This article analyzes and reproduces authentication and communication vulnerabilities in Rockwell PLCs.

Rockwell Automation is one of the world's largest automation and information companies, with a wide range of products including advanced process control, variable frequency drives, motion control, HMI, motor control centers, distributed control systems, and programmable controllers.

 

Part 1: Vulnerability analysis

The AB PLC uses the ENIP protocol for communication and does not verify the source of received data. Analysis of RSlinx and PLC communication packets confirmed that after obtaining a session and establishing a connection, it is possible to send commands to the PLC to change its IP address, causing the PLC to disconnect from existing devices.

Proof of concept: first use command code 0x65 to register a session, then append the returned session identifier to the modify-IP command. This completes a remote IP modification operation.

b0ec66d4-212f-11ee-962d-dac502259ad0.jpg

 

b13ad33c-212f-11ee-962d-dac502259ad0.jpg

Verification

Before modification, the PLC IP was 192.168.1.44.

b1600c2e-212f-11ee-962d-dac502259ad0.jpg

b176fa6a-212f-11ee-962d-dac502259ad0.jpg

 

After running the proof of concept, the PLC IP was changed to 192.168.1.144.

b1c19f0c-212f-11ee-962d-dac502259ad0.jpg

b1dc0478-212f-11ee-962d-dac502259ad0.jpg

 

Part 4: Remediation

The vendor has released patches and firmware updates to address the vulnerability. Upgrade affected devices to the latest firmware as soon as possible.


2026 AIVON.COM All Rights Reserved
Intellectual Property Rights | Terms of Service | Privacy Policy | Refund Policy