Company Details
plex-by-rockwell-automation
444
26,989
5112
rockwellautomation.com
0
PLE_3058679
In-progress

Plex, by Rockwell Automation Company CyberSecurity Posture
rockwellautomation.comPlex, by Rockwell Automation, is a leader in cloud-delivered smart manufacturing solutions, empowering the world's manufacturers to make awesome products. Our platform gives manufacturers the ability to connect, automate, track, and analyze every aspect of their business to drive transformation. The Plex Smart Manufacturing Platform™ includes solutions for manufacturing execution (MES), ERP, quality, supply chain planning and management, asset performance management, production monitoring, process automation and analytics to connect people, systems, machines and supply chains, enabling them to lead with precision, efficiency and agility. To learn more, visit www.plex.com.
Company Details
plex-by-rockwell-automation
444
26,989
5112
rockwellautomation.com
0
PLE_3058679
In-progress
Between 700 and 749

PRA Global Score (TPRM)XXXX

Description: Plex confirmed a security breach where an unauthorized party accessed one of its databases, exposing a subset of customer data. The compromised information included **email addresses, usernames, and securely hashed passwords**, though Plex emphasized that passwords were hashed per industry standards (algorithm undisclosed). While payment card data was not at risk—since Plex does not store such details—the incident marks the company’s **second major breach in recent years**, following a similar 2022 attack. Plex contained the breach swiftly and mandated password resets for all users, advising additional precautions like enabling **two-factor authentication (2FA)** and logging out of active sessions. The company fixed the exploited vulnerability but did not disclose technical specifics or remediation steps. The exposure of **customer credentials** raises risks of credential-stuffing attacks or phishing attempts, despite the hashing protection.


No incidents recorded for Plex, by Rockwell Automation in 2025.
No incidents recorded for Plex, by Rockwell Automation in 2025.
No incidents recorded for Plex, by Rockwell Automation in 2025.
PRA cyber incidents detection timeline including parent company and subsidiaries

Plex, by Rockwell Automation, is a leader in cloud-delivered smart manufacturing solutions, empowering the world's manufacturers to make awesome products. Our platform gives manufacturers the ability to connect, automate, track, and analyze every aspect of their business to drive transformation. The Plex Smart Manufacturing Platform™ includes solutions for manufacturing execution (MES), ERP, quality, supply chain planning and management, asset performance management, production monitoring, process automation and analytics to connect people, systems, machines and supply chains, enabling them to lead with precision, efficiency and agility. To learn more, visit www.plex.com.


Every company has a mission. What's ours? To empower every person and every organization to achieve more. We believe technology can and should be a force for good and that meaningful innovation contributes to a brighter world in the future and today. Our culture doesn’t just encourage curiosity; it
Catalyzing the era of pervasive intelligence, Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation. We partner closely with semiconductor and systems customers across a wide range of

Intuit is a global technology platform that helps our customers and communities overcome their most important financial challenges. Serving millions of customers worldwide with TurboTax, QuickBooks, Credit Karma and Mailchimp, we believe that everyone should have the opportunity to prosper and we wo

DiDi Global Inc. is a leading mobility technology platform. It offers a wide range of app-based services across Asia Pacific, Latin America, and other global markets, including ride hailing, taxi hailing, designated driving, hitch and other forms of shared mobility as well as certain energy and vehi

On the Fulfillment Technologies & Robotics Team, we build dynamic partnerships between people and intelligent machines. This intricate collaboration helps Amazon fulfill orders with unmatched accuracy. Since we began working with robotics, we've added over a million new jobs worldwide. Working in s

**Snowflake is proud to be the Official Data Collaboration Provider for LA28 and Team USA.** Snowflake delivers the AI Data Cloud — a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance. Inside the AI Data Cloud, organizations unite
Workday is a leading provider of enterprise cloud applications for finance and human resources, helping customers adapt and thrive in a changing world. Workday applications for financial management, human resources, planning, spend management, and analytics are built with artificial intelligence and
Founded in 2003, LinkedIn connects the world's professionals to make them more productive and successful. With more than 1 billion members worldwide, including executives from every Fortune 500 company, LinkedIn is the world's largest professional network. The company has a diversified business mode
Instacart, the leading grocery technology company in North America, works with grocers and retailers to transform how people shop. The company partners with more than 1,500 national, regional, and local retail banners to facilitate online shopping, delivery and pickup services from more than 85,000
.png)
Challenge. Embodying the motto “Customer Success is Our Success,” the company recognised the need for a more advanced ERP system after relying on the same...
Here's an overview of some of last week's most interesting news, articles, interviews and videos: 300k+ Plex Media Server instances still...
Rockwell Automation's 2025 Smart Manufacturing Report reveals that 95% of manufacturers are investing in AI to boost efficiency.
From giants like Oracle NetSuite and SAP to specialists like Sage Intacct, here are Technology Magazine's top 10 cloud ERPs for 2025.
Manufacturers are facing a critical labor shortage. Rockwell Automation has launched Connected Worker Plex to tackle this workforce crisis.
Tasti has selected Plex, a Rockwell Automation smart manufacturing and business process solution, to conduct its end-to-end digital transformation.
Snack bar and wholefood ball manufacturer Tasti Products Limited has chosen the platform Plex by Rockwell Automation, as its new integrated...
Plex, by Rockwell Automation, has been selected by snack food manufacturer Tasti New Zealand to provide it with an end-to-end digital...
Francisco Partners has agreed to sell Plex Systems, a cloud-native smart manufacturing platform, to Rockwell Automation (NYSE: ROK) for...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Plex, by Rockwell Automation is http://www.plex.com.
According to Rankiteo, Plex, by Rockwell Automation’s AI-generated cybersecurity score is 728, reflecting their Moderate security posture.
According to Rankiteo, Plex, by Rockwell Automation currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Plex, by Rockwell Automation is not certified under SOC 2 Type 1.
According to Rankiteo, Plex, by Rockwell Automation does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Plex, by Rockwell Automation is not listed as GDPR compliant.
According to Rankiteo, Plex, by Rockwell Automation does not currently maintain PCI DSS compliance.
According to Rankiteo, Plex, by Rockwell Automation is not compliant with HIPAA regulations.
According to Rankiteo,Plex, by Rockwell Automation is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Plex, by Rockwell Automation operates primarily in the Software Development industry.
Plex, by Rockwell Automation employs approximately 444 people worldwide.
Plex, by Rockwell Automation presently has no subsidiaries across any sectors.
Plex, by Rockwell Automation’s official LinkedIn profile has approximately 26,989 followers.
Plex, by Rockwell Automation is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Plex, by Rockwell Automation does not have a profile on Crunchbase.
Yes, Plex, by Rockwell Automation maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/plex-by-rockwell-automation.
As of November 28, 2025, Rankiteo reports that Plex, by Rockwell Automation has experienced 1 cybersecurity incidents.
Plex, by Rockwell Automation has an estimated 26,620 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with breach was quickly contained, and remediation measures with fixed the exploited vulnerability (technical details not disclosed), remediation measures with mandatory password reset for all users, and communication strategy with public notification, communication strategy with user advisories for password reset and 2fa enablement, communication strategy with clarification that payment data was not at risk..
Title: Plex Database Breach Exposes Customer Data
Description: Plex confirmed a security incident where an unauthorized party accessed one of its databases, exposing a subset of customer data including email addresses, usernames, and securely hashed passwords. The breach was quickly contained, and Plex advised all users to reset their passwords. This marks the second major security issue for Plex in recent years, following a similar 2022 breach.
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Email addresses, Usernames, Securely hashed passwords
Systems Affected: One of Plex's databases
Brand Reputation Impact: Potential reputational damage due to second breach in recent years
Identity Theft Risk: Low (passwords were hashed, but algorithm not disclosed; brute-force risk remains)
Payment Information Risk: None (Plex does not store payment card information)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Email Addresses, Usernames, Securely Hashed Passwords and .

Entity Name: Plex
Entity Type: Company
Industry: Media/Streaming Services

Incident Response Plan Activated: True
Containment Measures: Breach was quickly contained
Remediation Measures: Fixed the exploited vulnerability (technical details not disclosed)Mandatory password reset for all users
Communication Strategy: Public notificationUser advisories for password reset and 2FA enablementClarification that payment data was not at risk

Type of Data Compromised: Email addresses, Usernames, Securely hashed passwords
Sensitivity of Data: Moderate (no payment data; passwords hashed but algorithm undisclosed)
Data Encryption: Partially (passwords were hashed; other data likely unencrypted)
Personally Identifiable Information: Email addressesUsernames
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Fixed the exploited vulnerability (technical details not disclosed), Mandatory password reset for all users, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by breach was quickly contained and .

Recommendations: Users should reset passwords via plex.tv/reset and select 'Sign out connected devices after password change'., Single Sign-On (SSO) users should log out of all sessions via plex.tv/security and reauthenticate., Enable two-factor authentication (2FA) for added security., Remain vigilant against phishing attempts (Plex will never request passwords or payment details via email).Users should reset passwords via plex.tv/reset and select 'Sign out connected devices after password change'., Single Sign-On (SSO) users should log out of all sessions via plex.tv/security and reauthenticate., Enable two-factor authentication (2FA) for added security., Remain vigilant against phishing attempts (Plex will never request passwords or payment details via email).Users should reset passwords via plex.tv/reset and select 'Sign out connected devices after password change'., Single Sign-On (SSO) users should log out of all sessions via plex.tv/security and reauthenticate., Enable two-factor authentication (2FA) for added security., Remain vigilant against phishing attempts (Plex will never request passwords or payment details via email).Users should reset passwords via plex.tv/reset and select 'Sign out connected devices after password change'., Single Sign-On (SSO) users should log out of all sessions via plex.tv/security and reauthenticate., Enable two-factor authentication (2FA) for added security., Remain vigilant against phishing attempts (Plex will never request passwords or payment details via email).
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Plex Official NotificationUrl: https://plex.tv/reset.

Investigation Status: Ongoing (vulnerability fixed; technical details not disclosed)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Notification, User Advisories For Password Reset And 2Fa Enablement and Clarification That Payment Data Was Not At Risk.

Customer Advisories: Mandatory password reset for all users.Enable 2FA for enhanced security.Log out of all sessions for SSO users.Plex will not request sensitive information via email.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Mandatory Password Reset For All Users., Enable 2Fa For Enhanced Security., Log Out Of All Sessions For Sso Users., Plex Will Not Request Sensitive Information Via Email. and .

Corrective Actions: Fixed The Exploited Vulnerability, Enforced Password Resets And 2Fa Recommendations,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Fixed The Exploited Vulnerability, Enforced Password Resets And 2Fa Recommendations, .
Most Significant Data Compromised: The most significant data compromised in an incident were Email addresses, Usernames, Securely hashed passwords and .
Most Significant System Affected: The most significant system affected in an incident was One of Plex's databases.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Breach was quickly contained.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Email addresses, Securely hashed passwords and Usernames.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Remain vigilant against phishing attempts (Plex will never request passwords or payment details via email)., Users should reset passwords via plex.tv/reset and select 'Sign out connected devices after password change'., Enable two-factor authentication (2FA) for added security. and Single Sign-On (SSO) users should log out of all sessions via plex.tv/security and reauthenticate..
Most Recent Source: The most recent source of information about an incident is Plex Official Notification.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://plex.tv/reset .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (vulnerability fixed; technical details not disclosed).
Most Recent Customer Advisory: The most recent customer advisory issued was an Mandatory password reset for all users.Enable 2FA for enhanced security.Log out of all sessions for SSO users.Plex will not request sensitive information via email.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.