Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Exploited Rockwell Vulnerability in ICS Revealed

Exploited Rockwell Vulnerability in ICS Revealed

Posted on March 6, 2026 By CWS

An existing vulnerability in Rockwell Automation’s industrial control system (ICS) products has been actively exploited, as confirmed by the company and the cybersecurity agency CISA. This security gap, identified as CVE-2021-22681, has now been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog, with directives issued for federal agencies to mitigate the risk by March 26.

Impact and Scope of the Vulnerability

The vulnerability affects the Studio 5000 Logix Designer software along with various Logix programmable logic controllers (PLCs), such as CompactLogix, ControlLogix, DriveLogix, FlexLogix, GuardLogix, and SoftLogix devices. Initially disclosed in February 2021, the issue stems from a poorly protected cryptographic key, potentially allowing unauthorized remote access to controllers by impersonating an engineering workstation.

Claroty, along with researchers from Soonchunhyang University and Kaspersky, was instrumental in reporting this vulnerability to Rockwell back in 2019. If exploited in an industrial setting, attackers could manipulate the logic of PLCs, disrupt manufacturing operations, or even inflict physical damage on equipment.

Current Threat Landscape

Rockwell has recently updated its advisory to acknowledge the real-world exploitation of CVE-2021-22681. However, specific details regarding these attacks have not been publicly disclosed. SecurityWeek has reached out to Rockwell for further comments, awaiting any forthcoming updates.

A Shodan search indicates nearly 6,000 Rockwell devices are currently exposed on the internet, but the extent of those affected by this particular vulnerability remains uncertain. In 2024, Rockwell issued a security advisory urging customers to disconnect their ICS devices from the internet, underscoring the risk of malicious exploitation.

Future Implications and Recommendations

In 2023, Rockwell and CISA highlighted a different vulnerability (CVE-2023-3595) within Rockwell controllers, which an unnamed advanced persistent threat (APT) group had exploited. Although no actual exploits have been confirmed, the potential for disruption or damage underscores the necessity for vigilance.

Currently, CVE-2021-22681 is the sole Rockwell vulnerability listed in CISA’s KEV catalog. It is crucial for organizations using these ICS products to implement the recommended security measures and remain alert to any further advisories from Rockwell and CISA.

Related articles discuss the targeting of ICS/OT by threat groups and vulnerabilities in other control systems, emphasizing the ongoing challenges in securing critical infrastructure.

Security Week News Tags:APT, CISA, Claroty, CVE-2021-22681, Cybersecurity, ICS, industrial control systems, PLC, Rockwell, Vulnerability

Post navigation

Previous Post: Boost Cybersecurity with AI-Powered Risk Management
Next Post: Iranian Hackers Target U.S. Networks with New Malware

Related Posts

Pro-Russian Hackers Claim Cyberattack on French Postal Service Pro-Russian Hackers Claim Cyberattack on French Postal Service Security Week News
CISA Requests Public Feedback on Updated SBOM Guidance CISA Requests Public Feedback on Updated SBOM Guidance Security Week News
Unbound Raises  Million to Secure Gen-AI Adoption Unbound Raises $4 Million to Secure Gen-AI Adoption Security Week News
PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins Security Week News
Zania Raises  Million for AI-Powered GRC Platform Zania Raises $18 Million for AI-Powered GRC Platform Security Week News
New Reports Reinforce Cyberattack’s Role in Maduro Capture Blackout New Reports Reinforce Cyberattack’s Role in Maduro Capture Blackout Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious Chrome Extension Targets Crypto Wallets
  • Pentagon’s AI Dispute with Anthropic Over Autonomy
  • OpenAI Unveils Codex Security for Software Vulnerabilities
  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious Chrome Extension Targets Crypto Wallets
  • Pentagon’s AI Dispute with Anthropic Over Autonomy
  • OpenAI Unveils Codex Security for Software Vulnerabilities
  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News