Blog

Internet-Exposed PLCs: Addressing the Risks Behind the Headlines

Apr 15, 2026

Internet-Exposed PLCs: Addressing the Risks Behind the Headlines

The Exposure That Predates the Headlines

Recent advisories and reporting have highlighted cyber activity targeting internet-facing Operational Technology devices, particularly Rockwell Automation and Allen-Bradley PLCs such as CompatLogix and Micro850 models. While media coverage tends to focus on who may be behind these campaigns, the more important question for industrial organizations is: why are these devices still “directly” reachable from the internet in the first place?

The underlying vulnerabilities are not new. Internet-exposed PLCs, unprotected remote access via tools like Rockwell’s Studio 5000 Logix Designer, and persistent SSH services (such as Dropbear SSH used as a remote access backdoor) represent risks that have been documented for years. What has changed is the threat environment. Heightened geopolitical tensions across multiple regions have increased adversarial interest in critical infrastructure, making previously tolerable exposures genuinely dangerous.

This is not a call to panic. It is a call to address known gaps before they are tested.

 

 

Practical Steps to Reduce Exposure

Before considering any additional security tooling, there are immediate actions every organization running Rockwell infrastructure should evaluate:

Remove direct internet exposure. PLCs should not be reachable from the public internet. Place them behind firewalls or secure gateways, and audit your environment for any devices with unintended public-facing IP addresses.

Restrict and secure remote access. Where remote connectivity is operationally necessary, enforce it through VPNs/ZTNA, jump hosts, IP allowlists, and multi-factor authentication. Eliminate any default or shared credentials.

Apply Rockwell-specific hardening. Where operationally appropriate, set the physical mode switch to the “Run” position to prevent unauthorized program changes. Review and restrict access to Studio 5000 Logix Designer.

Audit for known vulnerabilities. Cross-reference your deployed Rockwell firmware versions against published CVEs and apply available patches where maintenance windows allow.

 

 

Strengthening Network Protection Around OT Zones

For organizations looking to move beyond basic hygiene, network-level protection purpose-built for OT environments can significantly reduce risk.

TXOne Edge solutions provide inline network security that is designed for industrial environments. Rather than passively monitoring traffic after the fact, Edge enforces protection at wire speed:

  • OT network segmentation creates secure boundaries between internet-facing zones and critical control system networks, preventing unauthorized lateral movement.
  • Deep packet inspection across EtherNet/IP, CIP, and other industrial protocols (180+ supported) enables detection and blocking of exploit attempts targeting specific Rockwell CVEs.
  • Granular traffic control restricts communication by source IP, port, and protocol, covering commonly targeted services including TCP 44818 (Explicit Messaging), UDP 2222 (Implicit Messaging), TCP 502 (Modbus), and TCP 22 (SSH).
  • Hardware bypass ensures that if the security appliance itself encounters an issue, production traffic continues uninterrupted.

 

 

Hardening OT Endpoints

Network protection addresses traffic between devices. Endpoint protection addresses what runs on them.

TXOne Stellar protects OT endpoints directly, including the legacy Windows systems that are common in Rockwell environments:

  • Application lockdown establishes an allowlist of approved executables, preventing unauthorized software (including tools used for persistent remote access) from running on protected endpoints.
  • Malware scanning for legacy systems covers Windows XP through Windows 11, ensuring that older equipment running Rockwell software is not a blind spot.
  • Signature updates addressing current threats, including detection rules for SSH-based remote access tools used in recent campaigns against industrial targets.

 

 

Act on What You Can Control

The geopolitical landscape is beyond any single organization’s influence. The security posture of your OT environment is not. The exposures being targeted today, internet-facing PLCs, weak remote access controls, and unprotected endpoints, are all addressable with deliberate action.

Organizations that take these steps now reduce their risk regardless of which threat actors are active or what their motivations may be. The goal is not to respond to a single campaign, but to close gaps that leave critical operations vulnerable to any adversary.

Ready to assess your Rockwell OT environment? A TXOne Security Architecture Assessment can identify exposed devices, map network segmentation gaps, and recommend a prioritized remediation plan. Contact us to schedule an assessment.

 

 

TXOne image
TXOne Networks

Need Assistance with OT Security ?

Our team is here to assist with OT security challenges and provide guidance on implementing effective solutions.​