Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56234: n/a

0
High
VulnerabilityCVE-2025-56234cvecve-2025-56234
Published: Mon Sep 29 2025 (09/29/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

AT_NA2000 from Nanda Automation Technology vendor has a denial-of-service vulnerability. For the processing of TCP RST packets, PLC AT_NA2000 has a wide acceptable range of sequence numbers. It does not require the sequence number to exactly match the next expected sequence value, just to be within the current receive window, which violates RFC5961. This flaw allows attackers to send multiple random TCP RST packets to hit the acceptable range of sequence numbers, thereby interrupting normal connections and causing a denial-of-service attack.

AI-Powered Analysis

AILast updated: 10/28/2025, 20:43:41 UTC

Technical Analysis

The vulnerability identified as CVE-2025-56234 affects the AT_NA2000 programmable logic controller (PLC) produced by Nanda Automation Technology. It is a denial-of-service (DoS) vulnerability stemming from the device's TCP stack implementation, specifically how it processes TCP reset (RST) packets. According to RFC 5961, a TCP RST packet should only be accepted if its sequence number exactly matches the next expected sequence number, preventing attackers from easily resetting connections. However, the AT_NA2000 PLC accepts RST packets with sequence numbers anywhere within the current receive window, a much broader range. This flaw allows an attacker to send multiple random TCP RST packets with sequence numbers that fall within this range, causing the PLC to prematurely terminate legitimate TCP connections. The result is a denial-of-service condition where normal communication with the PLC is interrupted, potentially halting industrial processes controlled by the device. The vulnerability does not require any authentication or user interaction, and the attack can be launched remotely over the network. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and the impact on availability. No patches or vendor advisories are currently available, and no known exploits have been reported in the wild. The vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption), indicating that the attack can exhaust system resources by repeatedly resetting connections. This issue is particularly critical in industrial environments where AT_NA2000 PLCs are deployed, as disruption can lead to operational downtime and safety risks.

Potential Impact

For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that deploy AT_NA2000 PLCs, this vulnerability poses a significant operational risk. Successful exploitation can interrupt communication between control systems and PLCs, leading to process halts, production downtime, and potential safety hazards. The denial-of-service condition could affect industrial automation networks, causing cascading failures or delays in critical operations. Given the remote exploitability without authentication, attackers could disrupt operations from outside the network perimeter if adequate protections are not in place. This could also impact supply chains reliant on automated processes controlled by these PLCs. The lack of patches increases the urgency for organizations to implement compensating controls. Additionally, regulatory compliance frameworks in Europe, such as NIS2, emphasize the protection of critical infrastructure, making mitigation of such vulnerabilities a priority to avoid legal and reputational consequences.

Mitigation Recommendations

Since no patches or firmware updates are currently available from Nanda Automation Technology, European organizations should implement the following specific mitigations: 1) Deploy network segmentation to isolate AT_NA2000 PLCs from general IT networks and restrict access to trusted management stations only. 2) Implement strict firewall rules and intrusion prevention systems (IPS) to detect and block suspicious TCP RST packets, especially those with sequence numbers that could exploit this vulnerability. 3) Use deep packet inspection (DPI) tools capable of enforcing RFC 5961-compliant TCP behavior to prevent acceptance of out-of-sequence RST packets. 4) Monitor network traffic for abnormal TCP reset activity targeting PLC IP addresses and set up alerts for potential exploitation attempts. 5) Employ VPNs or secure tunnels for remote access to PLCs to reduce exposure to external attackers. 6) Engage with the vendor for updates and subscribe to security advisories to apply patches promptly once available. 7) Conduct regular security audits and penetration tests focusing on industrial control system networks to identify and remediate similar protocol handling weaknesses. 8) Train operational technology (OT) personnel to recognize signs of denial-of-service attacks and respond swiftly to minimize downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68dab94e9365454039216219

Added to database: 9/29/2025, 4:52:30 PM

Last enriched: 10/28/2025, 8:43:41 PM

Last updated: 11/16/2025, 9:05:34 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats