Cyberthreat Advisories | 1898 & Co.

Rockwell Automation Logix Products — Actively Exploited Authentication Bypass via Insufficiently Protected Cryptographic Key

Written by The 1898 & Co. Team | March 17, 2026

3. Rockwell Automation Security Advisory — Studio 5000 Logix Designer VulnerabilityRockwell Automation has confirmed active in-the-wild exploitation of a critical authentication bypass vulnerability affecting its widely deployed Studio 5000 Logix Designer software and multiple Logix controller product families. The United States Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to its Known Exploited Vulnerabilities (KEV) catalog on March 5, 2026, establishing a mandatory federal remediation deadline of March 26, 2026. The vulnerability was originally disclosed in February 2021 but its exploitation in operational environments has only recently been confirmed, underscoring the persistent threat window created when industrial control system patches are delayed or unavailable.

The vulnerability, tracked as CVE-2021-22681 with a CVSS v3.1 score of 9.8 (Critical), stems from the way Rockwell Automation Logix products protect the cryptographic key used to authenticate communication between the Studio 5000 Logix Designer engineering software and Logix programmable logic controllers (PLCs). Because this key is insufficiently protected, a remote, unauthenticated attacker who discovers or intercepts the key can impersonate legitimate engineering software, bypass all authentication controls, and establish an authenticated session directly with affected controllers — without any valid credentials.

This vulnerability is particularly dangerous in industrial environments because PLCs serve as the last line of programmatic control over physical processes — from manufacturing lines and water treatment to power generation and chemical processing. Successful exploitation does not merely result in data theft; it enables an adversary to modify controller logic, issue unauthorized commands to physical equipment, or disable safety interlocks, with potential consequences ranging from production disruption to physical damage and safety incidents.

Threats and Vulnerabilities

CVE-2021-22681, with a CVSS v3.1 score of 9.8 (Critical), affects Rockwell Automation's RSLogix 5000 software (versions 16 through 20) and Studio 5000 Logix Designer (version 21.0 and later), as well as multiple Logix controller hardware platforms including CompactLogix 1768, 1769, 5370, 5380, and 5480 series; ControlLogix 5550, 5560, 5570, and 5580 series; DriveLogix, GuardLogix, and SoftLogix 5800 devices. The vulnerability is classified under CWE-522 (Insufficiently Protected Credentials) and is exploitable remotely over the network with no authentication, no user interaction, and low attack complexity, giving it the maximum possible network-reachable attack profile. An attacker who obtains the authentication key — which may be discoverable through network traffic capture, reverse engineering of the engineering software, or lateral movement within an OT network — can connect directly to any affected PLC and interact with it as if they were authorized engineering personnel. This means the attacker can upload or download ladder logic programs, modify configuration parameters, read process data, or halt controller execution entirely. The vulnerability was originally reported to Rockwell Automation in 2019 by researchers from Soonchunhyang University, Kaspersky, and Claroty, and publicly disclosed in February 2021. Rockwell issued mitigation guidance at that time but no firmware patch has been released that fully eliminates the vulnerability across all affected platforms. The recent CISA KEV addition confirms that threat actors have now moved beyond research and are actively using this weakness in attacks against operational technology environments.

Client Impact

Organizations running Rockwell Automation Logix-based control systems face direct operational risk from this vulnerability. Because the affected products span the engineering workstation software and the physical controllers themselves, a successful attack could result in unauthorized modification of PLC logic — effectively giving an adversary hands-on control of industrial processes without physical access to the facility. In sectors such as manufacturing, utilities, oil and gas, and water treatment, this level of access can trigger unplanned outages, equipment damage, or safety system bypasses, with downstream consequences including production losses, facility downtime, supply chain disruption, and — in worst-case scenarios — harm to personnel or the surrounding community.

From a compliance and regulatory standpoint, the CISA KEV listing triggers mandatory remediation requirements for all U.S. federal agencies under Binding Operational Directive 22-01, with a hard deadline of March 26, 2026. Organizations in critical infrastructure sectors subject to NERC CIP, TSA security directives, or sector-specific ICS security requirements should treat this KEV listing as a prioritization signal and document their remediation or compensating control actions to demonstrate due diligence to regulators. Failure to address a Known Exploited Vulnerability that subsequently leads to an OT incident may significantly complicate regulatory defense and cyber insurance claims.

Mitigations

Organizations using affected Rockwell Automation Logix products should immediately take the following actions to reduce their exposure to CVE-2021-22681:

1. Consult Rockwell Automation's security advisory guidance for CVE-2021-22681 and apply all available vendor-recommended mitigations specific to your product version, including any authentication and key management hardening steps described in the advisory.

2. Isolate engineering workstations running Studio 5000 Logix Designer from untrusted network segments using firewalls, VLANs, or unidirectional security gateways, ensuring that PLC communication traffic cannot be observed or intercepted by unauthorized parties.

3. Implement network-level access controls (allowlisting) so that only authorized engineering workstations can initiate communication sessions with Logix controllers on EtherNet/IP port 44818, blocking all other sources at the perimeter of the OT network.

4. Monitor for anomalous PLC connection activity — particularly connections initiated from unexpected IP addresses, outside maintenance windows, or from hosts not registered in the OT asset inventory — and configure alerts in your OT monitoring platform or SIEM for these conditions.

5. If mitigations cannot be applied and the systems cannot be adequately isolated, evaluate whether affected controllers should be taken offline or placed in a protected configuration mode until a remediation path is available, in accordance with the CISA BOD 22-01 requirement to discontinue use if mitigations are unavailable.

Organizations should document all actions taken in response to this advisory, including compensating controls applied to systems where full mitigation is not immediately feasible, to support regulatory and insurance reporting obligations.

1898 & Co. Response

1898 & Co. maintains an active practice in operational technology cybersecurity and industrial control system defense, with deep expertise in the Rockwell Automation product ecosystem that underlies much of North American critical infrastructure. Our ICS security engineers regularly assess Logix-based control environments, conduct OT network segmentation reviews, and deliver threat hunt capabilities specifically designed to detect unauthorized interaction with Logix PLCs and other industrial devices. We have established playbooks for responding to vulnerability disclosures of this type and are prepared to support clients in assessing their exposure and implementing compensating controls.

Our team tracks CISA KEV additions and vendor security advisories on a continuous basis, enabling us to provide timely, contextual guidance when vulnerabilities of this severity become confirmed exploited. For clients operating Rockwell Automation environments, we can conduct targeted assessments to determine which controller platforms and software versions are present in the environment, review network architecture for segmentation gaps that could enable exploitation of CVE-2021-22681, and validate that existing monitoring capabilities would detect the anomalous PLC connection behavior associated with this attack path.

1898 & Co. is committed to helping clients navigate the intersection of operational requirements and cybersecurity risk in complex OT environments. If your organization operates Rockwell Automation Logix systems and needs assistance evaluating your exposure to this vulnerability, prioritizing remediation efforts, or strengthening detection capabilities, we encourage you to contact your 1898 & Co. account team promptly given the March 26, 2026 KEV remediation deadline.

Sources

1. NVD Entry — CVE-2021-22681

2. CISA Known Exploited Vulnerabilities Catalog — CVE-2021-22681

3. Rockwell Automation Security Advisory — Studio 5000 Logix Designer Vulnerability