{"id":104689,"date":"2025-02-27T15:46:40","date_gmt":"2025-02-27T07:46:40","guid":{"rendered":"https:\/\/version-2.com\/?p=104689"},"modified":"2025-02-20T15:50:42","modified_gmt":"2025-02-20T07:50:42","slug":"how-to-find-rockwell-automation-devices-2","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/02\/how-to-find-rockwell-automation-devices-2\/","title":{"rendered":"How to find Rockwell Automation devices"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"104689\" class=\"elementor elementor-104689\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"prose dark:prose-light prose--blog prose--blog-wide\"><h2 id=\"latest-rockwell-automation-vulnerability\">Latest Rockwell Automation\u00a0vulnerability<\/h2><p>Rockwell Automation has disclosed a vulnerability in their GuardLogix and Compact\u00a0GuardLogix products.<\/p><p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-24478\">CVE-2025-24478<\/a>\u00a0is rated high, with a CVSS score of 7.1. Successful exploitation of this vulnerability would allow attackers to create an unrecoverable denial-of-service condition, requiring power cycling of the device to restore function. This vulnerability is exploitable over the network and without authentication.<\/p><p>The following devices are affected by this vulnerability:<\/p><ul><li>GuardLogix 5580 (SIL 3 with the safety partner 3): Versions prior to V33.017, V34.014, V35.013, V36.011<\/li><li>Compact GuardLogix 5380 SIL 3: Versions prior to V33.017, V34.014, V35.013, V36.011<\/li><\/ul><h2>\u00a0<\/h2><h2 id=\"are-updates-or-workarounds-available\">Are updates or workarounds available?<\/h2><p>Rockwell Automation has released <a href=\"https:\/\/www.rockwellautomation.com\/en-us\/trust-center\/security-advisories\/advisory.SD1718.html\" target=\"_blank\" rel=\"noopener\">patches<\/a> for the affected product. Users are advised to update their systems as quickly as possible.<\/p><h2>\u00a0<\/h2><h2 id=\"how-to-find-potentially-vulnerable-systems-with-runZero\">How to find potentially vulnerable systems with runZero<\/h2><p>From the <a href=\"https:\/\/console.runzero.com\/inventory\">Asset Inventory<\/a>, use the following query to locate potentially vulnerable systems:<\/p><pre style=\"position: relative;\"><code>hw:\"Rockwell Automation%Logix%5_80\"<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><hr \/><h2>\u00a0<\/h2><h2 id=\"october-2024-factoryTalk-thinManager\">October 2024:\u00a0FactoryTalk ThinManager<\/h2><p>Rockwell Automation has disclosed multiple vulnerabilities in their FactoryTalk ThinManager product.<\/p><p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-10386\" target=\"_blank\" rel=\"noopener\">CVE-2024-10386<\/a> is rated critical, with a CVSS v4 score of 9.3 and allows attackers with network access to send specially crafted packets that result in database manipulation.<\/p><p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-10387\" target=\"_blank\" rel=\"noopener\">CVE-2024-10387<\/a> is rated high, with CVSS v4 score of 8.7 and allows attackers with network access to send specially crafted packets to the device potentially triggering a denial-of-service.<\/p><p>The following versions are currently affected by these vulnerabilities:<\/p><ul><li>ThinManager: Versions 11.2.0 to 11.2.9<\/li><li>ThinManager: Versions 12.0.0 to 12.0.7<\/li><li>ThinManager: Versions 12.1.0 to 12.1.8<\/li><li>ThinManager: Versions 13.0.0 to 13.0.5<\/li><li>ThinManager: Versions 13.1.0 to 13.1.3<\/li><li>ThinManager: Versions 13.2.0 to 13.2.2<\/li><li>ThinManager: Version 14.0.0<\/li><\/ul><h3>\u00a0<\/h3><h3 id=\"are-updates-or-workarounds-available\">Are updates or workarounds available?<\/h3><p>Rockwell Automation has released <a href=\"https:\/\/thinmanager.com\/downloads\/\" target=\"_blank\" rel=\"noopener\">patches<\/a> for the affected product. Users are advised to update their systems as quickly as possible. In addition, users are advised to\u00a0limit communications to <strong>TCP 2031<\/strong> to only the devices that need connection to the ThinManager.<\/p><h3 id=\"how-to-find-potentially-vulnerable-systems-with-runZero\">How to find potentially vulnerable systems with runZero<\/h3><p>From the <a href=\"https:\/\/console.runzero.com\/inventory\">Asset Inventory<\/a>, use the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>vendor:\"Rockwell Automation\" AND tcp:2031<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><hr \/><h2>\u00a0<\/h2><h2 id=\"september-2024-controlLogix-guardLogix-compactLogix-and-compact-guardLogix\">September 2024: ControlLogix, GuardLogix, CompactLogix, and Compact GuardLogix<\/h2><p>Rockwell Automation has disclosed multiple vulnerabilities in their <strong>ControlLogix, GuardLogix, CompactLogix,<\/strong> and <strong>Compact GuardLogix<\/strong> products.<\/p><p>Successful exploitation of these vulnerabilities result in devices becoming inaccessible remotely and crashing and then require manual intervention to restart them.<\/p><p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-6077\">CVE-2024-6077<\/a>\u00a0is rated\u00a0<em>high<\/em>, with a CVSS v4 score of 8.7.<\/p><h3 id=\"are-updates-or-workarounds-available\">Are updates or workarounds available?<\/h3><p>Rockwell Automation has released\u00a0<a href=\"https:\/\/www.rockwellautomation.com\/en-us\/trust-center\/security-advisories.html\">patches and guidance<\/a>\u00a0for affected systems. Users are advised to upgrade as quickly as possible. Users may also disable CIP security on these devices to mitigate the issue.<\/p><h3 id=\"how-to-find-potentially-vulnerable-systems-with-runZero\">How to find potentially vulnerable systems with runZero<\/h3><p>From the <a href=\"https:\/\/console.runzero.com\/inventory\">Asset Inventory<\/a>, use the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>vendor:\"Rockwell Automation\" AND (hw:\"1756-EN2\" OR hw:\"1756-EN2\" OR hw:\"1756-ENBT\" OR hw:\"1756-CN2\/B\" OR hw:\"1756-CN2\/A\" OR hw:\"1756-CNB\/D,\" OR hw:\"1756-CNB\/E\")<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><hr \/><h2>\u00a0<\/h2><h2 id=\"august-2024-controlLogix-guardLogix-compactLogix-and-compact-guardLogix\">August 2024:\u00a0ControlLogix, GuardLogix, CompactLogix, and Compact GuardLogix<\/h2><p>Rockwell Automation has disclosed multiple vulnerabilities in their <strong>ControlLogix, GuardLogix, CompactLogix,<\/strong> and <strong>Compact GuardLogix<\/strong> products.<\/p><p>Successful exploitation of these vulnerabilities result in devices becoming inaccessible remotely and crashing and then require manual intervention to restart them.<\/p><p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-40619\" target=\"_blank\" rel=\"noopener\">CVE-2024-40619<\/a> is rated <em>medium<\/em> with <strong>CVSS score of 7.5<\/strong> and indicates a denial-of-service scenario due to a malformed <strong>CIP packet<\/strong> which causes a device to crash and require a manual restart.<\/p><table><tbody><tr><td><strong>Affected Product<\/strong><\/td><td><strong>First Known in Firmware Revision<\/strong><\/td><td><strong>Corrected in Firmware Revision<\/strong><\/td><\/tr><tr><td>ControlLogix 5580<\/td><td>v34.011<\/td><td>v34.014+<\/td><\/tr><tr><td>GuardLogix 5580<\/td><td>v34.011<\/td><td>v34.014+<\/td><\/tr><\/tbody><\/table><h3>\u00a0<\/h3><h3 id=\"are-updates-or-workarounds-available\">Are updates or workarounds available?<\/h3><p>Rockwell Automation suggests updating devices to the corrected firmware revision.<\/p><ul><li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-7515\">CVE-2024-7515<\/a> is rated <em>high<\/em> with CVSS score of 8.6 and indicates a denial-of-service scenario due to a malformed <strong>PTP management packet<\/strong> which causes a device to crash and require a manual restart.<\/li><li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-7507\">CVE-2024-7507<\/a> is rated <em>medium<\/em> with CVSS score of 7.5 and indicates a denial-of-service scenario due to a malformed <strong>PCCC packet<\/strong> which causes a device to crash and require a manual restart.<\/li><\/ul><p>Rockwell Automation suggests updating devices to the corrected firmware revision. Additionally, they recommend restricting communication to CIP object 103 (0x67).<\/p><table><tbody><tr><td><strong>Affected Product<\/strong><\/td><td><strong>Firmware Revision Prior To<\/strong><\/td><td><strong>Corrected in Firmware Revision<\/strong><\/td><\/tr><tr><td>CompactLogix 5380 (5069 &#8211; L3z)<\/td><td>v36.011, v35.013, v34.014<\/td><td>v36.011, v35.013, v34.014<\/td><\/tr><tr><td>CompactLogix 5480 (5069 &#8211; L4)<\/td><td>v36.011, v35.013, v34.014<\/td><td>v36.011, v35.013, v34.014<\/td><\/tr><tr><td>ControlLogix 5580 (1756 &#8211; L8z)<\/td><td>v36.011, v35.013, v34.014<\/td><td>v36.011, v35.013, v34.014<\/td><\/tr><tr><td>GuardLogix 5580 (1756 &#8211; L8z)<\/td><td>v36.011, v35.013, v34.014<\/td><td>v36.011, v35.013, v34.014<\/td><\/tr><tr><td>Compact GuardLogix 5380 (5069 &#8211; L3zS2)<\/td><td>v36.011, v35.013, v34.014<\/td><td>v36.011, v35.013, v34.014<\/td><\/tr><\/tbody><\/table><p>In all of the cases above users should ensure these devices are isolated in their own networks to prevent unwanted packets flooding the device.<\/p><h3>\u00a0<\/h3><h3 id=\"how-to-find-potentially-vulnerable-systems-with-runZero\">How to find potentially vulnerable systems with runZero<\/h3><p>From the <a href=\"https:\/\/console.runzero.com\/inventory\">Asset Inventory<\/a>, use the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>vendor:\"Rockwell Automation\" AND (hw:\"1756-EN2\" OR hw:\"1756-EN2\" OR hw:\"1756-ENBT\" OR hw:\"1756-CN2\/B\" OR hw:\"1756-CN2\/A\" OR hw:\"1756-CNB\/D,\" OR hw:\"1756-CNB\/E\")<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><hr \/><h2>\u00a0<\/h2><h2 id=\"august-2024-controlLogix-guardLogix-and-1756-controlLogix-i-o-modules\">August 2024:\u00a0ControlLogix, GuardLogix, and 1756 ControlLogix I\/O Modules<\/h2><p>On August 1st, 2024,\u00a0Rockwell Automation\u00a0<a href=\"https:\/\/www.rockwellautomation.com\/en-us\/trust-center\/security-advisories\/advisory.SD1682.html\" target=\"_blank\" rel=\"noopener\">disclosed<\/a> a vulnerability in their <strong>ControlLogix, GuardLogix, <\/strong>and<strong> 1756 ControlLogix I\/O Modules<\/strong> products.<\/p><p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-6242\" target=\"_blank\" rel=\"noopener\">CVE-2024-6242<\/a> is rated <em>high<\/em> with CVSS score of 7.3 and allows a threat actor to bypass the Trusted\u00ae Slot feature in a ControlLogix\u00ae controller.<\/p><p>Successful exploitation of these vulnerabilities on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and\/or device configuration on a Logix controller in the chassis.<\/p><h3>\u00a0<\/h3><h3 id=\"are-updates-or-workarounds-available\">Are updates or workarounds available?<\/h3><p>Rockwell Automation recommends upgrade devices to apply fixes for the affected devices.<\/p><table><tbody><tr><td><strong>Affected Product<\/strong><\/td><td><strong>First Known in Firmware Revision<\/strong><\/td><td><strong>Corrected in Firmware Revision<\/strong><\/td><\/tr><tr><td>ControlLogix\u00ae 5580 (1756-L8z)<\/td><td>V28<\/td><td>V32.016, V33.015, V34.014,<br \/>V35.011 and later<\/td><\/tr><tr><td>GuardLogix\u00ae 5580 (1756-L8zS)<\/td><td>V31<\/td><td>V32.016, V33.015, V34.014,<br \/>V35.011 and later<\/td><\/tr><tr><td>1756-EN4TR<\/td><td>V2<\/td><td>V5.001 and later<\/td><\/tr><tr><td><p>1756-EN2T , Series A\/B\/C<\/p><p>1756-EN2F, Series A\/B<\/p><p>1756-EN2TR, Series A\/B<\/p><p>1756-EN3TR, Series B<\/p><\/td><td>v5.007(unsigned) \/ v5.027(signed)<\/td><td>No fix is available for Series A\/B\/C. Users can upgrade to Series D to remediate this vulnerability<\/td><\/tr><tr><td><p>1756-EN2T, Series D<\/p><p>1756-EN2F, Series C<\/p><p>1756-EN2TR, Series C<\/p><p>1756-EN3TR, Series B<\/p><p>1756-EN2TP, Series A<\/p><\/td><td><p>1756-EN2T\/D: V10.006<\/p><p>1756-EN2F\/C: V10.009<\/p><p>1756-EN2TR\/C: V10.007<\/p><p>1756-EN3TR\/B: V10.007<\/p><p>1756-EN2TP\/A: V10.020<\/p><\/td><td>V12.001 and later<\/td><\/tr><\/tbody><\/table><p>Additionally, limit the allowed CIP commands on controllers by setting the mode switch to the <strong>RUN<\/strong> position.<\/p><h3>\u00a0<\/h3><h3 id=\"how-runZero-users-found-potentially-vulnerable-systems\">How runZero users found potentially vulnerable systems<\/h3><p>From the <a href=\"https:\/\/console.runzero.com\/inventory\">Asset Inventory<\/a>, runZero users applied the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>hw:\"1756-EN2\" OR hw:\"1756-EN3\" OR hw:\"1756-EN4\"<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><hr \/><h2>\u00a0<\/h2><h2 id=\"april-2024-controlLogix-5580-guard-logix-5580-compactLogix-5380-and-1756-en4tr\">April 2024:\u00a0ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR<\/h2><p>In April 2024,\u00a0Rockwell Automation\u00a0<a href=\"https:\/\/www.rockwellautomation.com\/en-us\/support\/advisory.SD1666.html\" target=\"_blank\" rel=\"noopener\">disclosed<\/a>\u00a0a vulnerability\u00a0in their ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR products.<\/p><p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3493\" target=\"_blank\" rel=\"noopener\">CVE-2024-3493<\/a> was rated high with CVSS score of 8.6 and involved a\u00a0specific malformed fragmented packet type which could cause a major nonrecoverable fault (MNRF) in Rockwell Automation&#8217;s ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR.\u00a0If exploited, the affected product would become unavailable and require a manual restart to recover it.<\/p><h3 id=\"what-was-the-impact\">What was the impact?<\/h3><p>Successful exploitation of these vulnerabilities resulted in devices becoming inaccessible remotely and crashing and then require manual intervention to restart them.<\/p><p>Rockwell Automation provided software updates for the impacted versions.<\/p><table><tbody><tr><td><strong>Affected Product<\/strong><\/td><td><strong>First Known in Firmware Revision<\/strong><\/td><td><strong>Corrected in Firmware Revision<\/strong><\/td><\/tr><tr><td>ControlLogix\u00ae 5580<\/td><td>V35.011<\/td><td>V35.013, V36.011<\/td><\/tr><tr><td>GuardLogix 5580<\/td><td>V35.011<\/td><td>V35.013, V36.011<\/td><\/tr><tr><td>CompactLogix 5380<\/td><td>V35.011<\/td><td>V35.013, V36.011<\/td><\/tr><tr><td>1756-EN4TR<\/td><td>V5.001<\/td><td>V6.001<\/td><\/tr><\/tbody><\/table><h3>\u00a0<\/h3><h3 id=\"how-runZero-users-found-potentially-vulnerable-systems\">How runZero users found potentially vulnerable systems<\/h3><p>From the <a href=\"https:\/\/console.runzero.com\/inventory\" target=\"_blank\" rel=\"noopener\">Asset Inventory<\/a>, runZero users could use the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>hw:\"1756-EN4TR\"<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><hr \/><h2>\u00a0<\/h2><h2 id=\"march-2024-rockwell-automation-powerFlex-527\">March 2024:\u00a0Rockwell Automation PowerFlex 527<\/h2><p>In March 2024,\u00a0Rockwell Automation <a href=\"https:\/\/www.rockwellautomation.com\/en-us\/support\/advisory.SD1664.html\">disclosed<\/a> multiple vulnerabilities in their PowerFlex 527 product.<\/p><p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-2425\" target=\"_blank\" rel=\"noopener\">CVE-2024-2425<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-2426\" target=\"_blank\" rel=\"noopener\">CVE-2024-2426<\/a> are both rated high with CVSS score of 7.5 and both involve improper input validation which could cause a web server to crash and CIP communication disruption, respectively, which leads to requiring manual restarts.<\/p><p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-2427\" target=\"_blank\" rel=\"noopener\">CVE-2024-2427<\/a> is rated high with CVSS score of 7.5 and indicates a denial-of-service scenario due to improper network packet throttling which causes a device to crash and require a manual restart.<\/p><h3>\u00a0<\/h3><h3 id=\"what-was-the-impact\">What was the impact?<\/h3><p>Successful exploitation of these vulnerabilities result in devices becoming inaccessible remotely and crashing and then require manual intervention to restart them.<\/p><h3>\u00a0<\/h3><h3 id=\"are-updates-or-workarounds-available\">Are updates or workarounds available?<\/h3><p>Rockwell Automation does not currently have a fix for these vulnerabilities. Users of the affected software are encouraged to apply risk mitigations and security best practices, where possible.<\/p><p>Users should disable the web server if it is not needed, which should be disabled by default. Additionally, users should ensure these devices are isolated in their own networks to prevent unwanted packets flooding the device.<\/p><h3>\u00a0<\/h3><h3 id=\"how-to-find-potentially-vulnerable-powerFlex-products\">How to find\u00a0potentially vulnerable PowerFlex products<\/h3><p>From the <a href=\"https:\/\/console.runzero.com\/inventory\" target=\"_blank\" rel=\"noopener\">Asset Inventory<\/a>, runZero users used\u00a0the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>hw.product:\"powerflex\"<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"55060\" class=\"elementor elementor-55060\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About runZero<\/strong><br \/>runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network\u2013without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Latest Rockwell Automation\u00a0vulnerability Rockwell Autom [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[976,1305,61],"tags":[977,1077],"class_list":["post-104689","post","type-post","status-publish","format-standard","hentry","category-runzero","category-1305","category-press-release","tag-runzero","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to find Rockwell Automation devices - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.runzero.com\/blog\/rockwell-automation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to find Rockwell Automation devices - Version 2\" \/>\n<meta property=\"og:description\" content=\"Latest Rockwell Automation\u00a0vulnerability Rockwell Autom [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.runzero.com\/blog\/rockwell-automation\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-27T07:46:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/rockwell-automation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/how-to-find-rockwell-automation-devices-2\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How to find Rockwell Automation devices\",\"datePublished\":\"2025-02-27T07:46:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/how-to-find-rockwell-automation-devices-2\\\/\"},\"wordCount\":1353,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"runZero\",\"2025\"],\"articleSection\":[\"runZero\",\"2025\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/rockwell-automation\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/how-to-find-rockwell-automation-devices-2\\\/\",\"url\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/rockwell-automation\\\/\",\"name\":\"How to find Rockwell Automation devices - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2025-02-27T07:46:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/rockwell-automation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/rockwell-automation\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/rockwell-automation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to find Rockwell Automation devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to find Rockwell Automation devices - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.runzero.com\/blog\/rockwell-automation\/","og_locale":"en_US","og_type":"article","og_title":"How to find Rockwell Automation devices - Version 2","og_description":"Latest Rockwell Automation\u00a0vulnerability Rockwell Autom [&hellip;]","og_url":"https:\/\/www.runzero.com\/blog\/rockwell-automation\/","og_site_name":"Version 2","article_published_time":"2025-02-27T07:46:40+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.runzero.com\/blog\/rockwell-automation\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/02\/how-to-find-rockwell-automation-devices-2\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How to find Rockwell Automation devices","datePublished":"2025-02-27T07:46:40+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/02\/how-to-find-rockwell-automation-devices-2\/"},"wordCount":1353,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["runZero","2025"],"articleSection":["runZero","2025","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.runzero.com\/blog\/rockwell-automation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/02\/how-to-find-rockwell-automation-devices-2\/","url":"https:\/\/www.runzero.com\/blog\/rockwell-automation\/","name":"How to find Rockwell Automation devices - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2025-02-27T07:46:40+00:00","breadcrumb":{"@id":"https:\/\/www.runzero.com\/blog\/rockwell-automation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.runzero.com\/blog\/rockwell-automation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.runzero.com\/blog\/rockwell-automation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How to find Rockwell Automation devices"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-rex","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/104689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=104689"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/104689\/revisions"}],"predecessor-version":[{"id":104696,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/104689\/revisions\/104696"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=104689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=104689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=104689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}