Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11044: CWE-770 Allocation of Resources Without Limits or Throttling in B&R Industrial Automation GmbH Automation Runtime

0
High
VulnerabilityCVE-2025-11044cvecve-2025-11044cwe-770
Published: Mon Jan 19 2026 (01/19/2026, 15:57:15 UTC)
Source: CVE Database V5
Vendor/Project: B&R Industrial Automation GmbH
Product: Automation Runtime

Description

An Allocation of Resources Without Limits or Throttling vulnerability in the ANSL-Server component of B&R Automation Runtime versions prior to 6.5 and prior to R4.93 could be exploited by an unauthenti-cated attacker on the network to win a race condition, resulting in permanent denial-of-service (DoS) conditions on affected devices.

AI-Powered Analysis

AILast updated: 01/26/2026, 19:53:14 UTC

Technical Analysis

CVE-2025-11044 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) found in the ANSL-Server component of B&R Industrial Automation GmbH's Automation Runtime product. The flaw exists in versions prior to 6.5 and prior to R4.93. It arises from improper handling of resource allocation, where the system fails to impose limits or throttling on resource requests. An unauthenticated attacker on the network can exploit a race condition to repeatedly allocate resources, overwhelming the system and causing a permanent denial-of-service (DoS) condition. This vulnerability does not require any user interaction or authentication, making it remotely exploitable with low complexity. The CVSS 4.0 base score of 8.9 reflects the vulnerability's high impact on availability and the ease with which it can be exploited. The lack of known exploits in the wild suggests it is either newly discovered or not yet weaponized, but the potential for disruption in industrial environments is significant. The Automation Runtime is widely used in industrial control systems (ICS) and manufacturing automation, where availability is critical. The vulnerability could disrupt production lines, cause safety system failures, or halt critical infrastructure operations. The race condition and resource exhaustion nature of the flaw mean that attackers can cause persistent outages until the system is manually recovered or rebooted. No patches are currently linked, indicating that organizations must monitor vendor advisories closely. Network segmentation, access control, and monitoring for anomalous traffic targeting the ANSL-Server component are essential interim defenses.

Potential Impact

For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant risk of operational disruption. B&R Automation Runtime is commonly deployed in industrial environments across Europe, where availability and reliability are paramount. Exploitation could lead to prolonged downtime of industrial control systems, resulting in production losses, safety hazards, and potential cascading effects on supply chains. The permanent denial-of-service condition could also necessitate costly manual intervention and system restarts, impacting operational continuity. Given the unauthenticated remote exploit vector, attackers could leverage this vulnerability to target multiple facilities simultaneously, amplifying the impact. The disruption could affect compliance with regulatory requirements for industrial safety and availability, potentially leading to legal and financial consequences. Furthermore, the vulnerability could be exploited as part of a broader attack campaign targeting European industrial sectors, which are often high-value targets due to their economic importance.

Mitigation Recommendations

1. Monitor B&R Industrial Automation GmbH advisories closely and apply official patches or updates as soon as they become available to address CVE-2025-11044. 2. Implement strict network segmentation to isolate the ANSL-Server component and restrict access only to trusted management and operational systems. 3. Deploy network-level access controls such as firewalls and intrusion prevention systems (IPS) to detect and block anomalous traffic patterns indicative of resource exhaustion or race condition exploitation attempts. 4. Use rate limiting and connection throttling on network devices to reduce the risk of resource exhaustion attacks targeting the vulnerable component. 5. Conduct regular security audits and vulnerability assessments of industrial control systems to identify and remediate exposure to this and similar vulnerabilities. 6. Establish incident response procedures specific to industrial environments to quickly recover from denial-of-service conditions, including system restarts and failover mechanisms. 7. Train operational technology (OT) personnel on recognizing signs of exploitation and maintaining secure configurations for automation runtime environments. 8. Consider deploying anomaly detection solutions tailored for ICS networks to identify early indicators of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ABB
Date Reserved
2025-09-26T09:17:09.708Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e57c1d302b072d9cbb9c9

Added to database: 1/19/2026, 4:11:45 PM

Last enriched: 1/26/2026, 7:53:14 PM

Last updated: 2/6/2026, 11:04:55 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats