PowerFlex 755’s Cleartext Catastrophe: Upgrade Now or Sniffle Later!
View CSAF and discover how the PowerFlex 755’s version 16.002.279 and prior might just be a hacker’s dream come true. Yes, sensitive data is being sent via cleartext—because who needs encryption, right? Rockwell Automation suggests upgrading to the latest version, unless you’re into sharing secrets with strangers.

Hot Take:
Rockwell Automation’s PowerFlex 755 is in hot water for transmitting sensitive information about as securely as a postcard. Forget about postcards; even carrier pigeons would blush at this security setup. Upgrade those systems before your credentials take a vacation to the dark web!
Key Points:
- PowerFlex 755 motor control drives are sending sensitive data in clear text via HTTP.
- The vulnerability is rated 8.7 on CVSS v4, meaning it’s a high-risk situation.
- Rockwell Automation has released a software update to tackle the issue.
- Organizations should implement VPNs, though keeping them updated is crucial.
- No public exploits have been reported yet, but don’t get too comfy; it’s not time to relax.
Already a member? Log in here