Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9124: CWE-248: Uncaught Exception in Rockwell Automation Compact GuardLogix® 5370

0
High
VulnerabilityCVE-2025-9124cvecve-2025-9124cwe-248
Published: Tue Oct 14 2025 (10/14/2025, 12:24:30 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: Compact GuardLogix® 5370

Description

A denial-of-service security issue in the affected product. The security issue stems from a fault occurring when a crafted CIP unconnected explicit message is sent. This can result in a major non-recoverable fault.

AI-Powered Analysis

AILast updated: 10/14/2025, 13:01:29 UTC

Technical Analysis

CVE-2025-9124 is a denial-of-service vulnerability identified in Rockwell Automation's Compact GuardLogix® 5370 controllers, affecting firmware versions 30.012 and earlier. The root cause is an uncaught exception triggered when the device receives a specially crafted CIP (Common Industrial Protocol) unconnected explicit message. This crafted message causes the controller to experience a major non-recoverable fault, effectively crashing or halting the device’s operation. The vulnerability does not require any authentication or user interaction, and can be exploited remotely over the network, making it highly accessible to attackers. The impact is primarily on availability, as the device becomes non-functional until manually reset or repaired. The vulnerability is categorized under CWE-248 (Uncaught Exception), indicating improper handling of unexpected conditions in the software. While no known exploits have been observed in the wild, the vulnerability’s high CVSS 4.0 score of 8.7 reflects its critical impact on industrial control systems. Rockwell Automation Compact GuardLogix® 5370 controllers are widely used in industrial automation environments, including manufacturing plants, utilities, and critical infrastructure sectors. Disruption of these controllers can lead to production downtime, safety hazards, and operational losses. The lack of a patch at the time of disclosure necessitates immediate mitigation through network-level controls and monitoring. This vulnerability highlights the importance of robust exception handling in industrial control firmware and the risks posed by network-exposed control protocols.

Potential Impact

The primary impact of CVE-2025-9124 is on the availability of industrial control systems using the Compact GuardLogix® 5370 controllers. Successful exploitation results in a major non-recoverable fault, causing the controller to crash or become unresponsive, which can halt automated processes and production lines. For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors, this can lead to significant operational disruptions, financial losses, and potential safety risks. Given the controllers’ role in managing critical automation tasks, downtime can affect supply chains and service delivery. Furthermore, the ease of remote exploitation without authentication increases the risk of targeted attacks or opportunistic disruptions. The lack of known exploits in the wild currently reduces immediate threat levels, but the vulnerability remains a high risk due to the critical nature of affected systems and the potential for future exploitation. Organizations may also face regulatory and compliance challenges if such disruptions impact safety or service continuity.

Mitigation Recommendations

1. Monitor Rockwell Automation’s advisories closely and apply firmware updates or patches as soon as they become available to address CVE-2025-9124. 2. Implement strict network segmentation to isolate industrial control systems from general IT networks and the internet, reducing exposure to crafted CIP messages. 3. Deploy deep packet inspection and protocol-aware firewalls to filter and block unauthorized or malformed CIP unconnected explicit messages. 4. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous CIP traffic patterns indicative of exploitation attempts. 5. Enforce strict access controls and network authentication mechanisms for devices communicating with Compact GuardLogix® 5370 controllers. 6. Conduct regular security audits and vulnerability assessments focused on industrial control networks to identify and remediate exposure points. 7. Develop and test incident response plans specific to industrial control system disruptions to minimize downtime and safety risks. 8. Train operational technology (OT) personnel on recognizing and responding to signs of denial-of-service attacks targeting control devices. These measures go beyond generic advice by focusing on network-level protections tailored to the CIP protocol and the operational environment of Rockwell Automation controllers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Rockwell
Date Reserved
2025-08-18T18:48:38.610Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ee4920509368ccaa724895

Added to database: 10/14/2025, 12:59:12 PM

Last enriched: 10/14/2025, 1:01:29 PM

Last updated: 10/16/2025, 11:05:53 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats