Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9278: CWE-400 Uncontrolled Resource Consumption in Rockwell Automation ArmorStart® LT

0
High
VulnerabilityCVE-2025-9278cvecve-2025-9278cwe-400
Published: Tue Jan 20 2026 (01/20/2026, 13:55:43 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: ArmorStart® LT

Description

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. After running a Burp Suite active scan, the device loses ICMP connectivity, causing the web application to become inaccessible.

AI-Powered Analysis

AILast updated: 01/20/2026, 14:36:52 UTC

Technical Analysis

CVE-2025-9278 is a vulnerability identified in Rockwell Automation's ArmorStart® LT product, specifically affecting versions 2.002 and earlier. The issue is classified under CWE-400, which pertains to uncontrolled resource consumption leading to denial-of-service conditions. The vulnerability manifests when an attacker performs an active scan using tools like Burp Suite against the device's web application interface. This scanning activity causes the device to lose ICMP connectivity, effectively making the device unreachable via ping and rendering the web application inaccessible. The root cause is likely due to insufficient input validation or resource management within the web application or underlying services, allowing resource exhaustion under certain request patterns. The CVSS 4.0 base score is 8.7, reflecting a high severity with network attack vector (AV:N), no required privileges (PR:N), no user interaction (UI:N), and a high impact on availability (VA:H). The vulnerability does not affect confidentiality or integrity, but the loss of availability can disrupt industrial processes controlled by ArmorStart® LT. No authentication is required to exploit this vulnerability, and no known exploits have been reported in the wild as of the publication date. No patches or official remediation guidance have been released yet by Rockwell Automation, indicating that affected organizations must rely on interim mitigations. The vulnerability highlights the risks of exposing industrial control system (ICS) devices to untrusted networks and the importance of robust resource management in embedded web applications.

Potential Impact

For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors relying on Rockwell Automation's ArmorStart® LT, this vulnerability poses a significant risk of operational disruption. The denial-of-service condition can halt automated processes, leading to production downtime, safety risks, and financial losses. Loss of ICMP connectivity and web interface access complicates remote management and incident response. Since ArmorStart® LT is used in industrial automation, availability is critical; any disruption can cascade into broader supply chain impacts. The lack of authentication requirement and ease of exploitation increase the threat level, especially if devices are exposed to external or less-secure internal networks. Although no known exploits exist yet, the vulnerability could be targeted by threat actors aiming to disrupt European industrial operations or conduct ransomware attacks by first disabling control systems. The impact is thus not only operational but also strategic, affecting national infrastructure resilience and economic stability.

Mitigation Recommendations

1. Immediately restrict network access to ArmorStart® LT devices by implementing strict firewall rules and network segmentation to isolate these devices from untrusted or general-purpose networks. 2. Disable or limit exposure of the web application interface to only trusted management networks or VPNs. 3. Monitor network traffic for scanning activity, especially from tools like Burp Suite or unusual ICMP traffic patterns, and block suspicious sources. 4. Implement rate limiting or intrusion prevention systems (IPS) that can detect and mitigate resource exhaustion attempts. 5. Coordinate with Rockwell Automation for updates on patches or firmware upgrades addressing this vulnerability and plan timely deployment once available. 6. Conduct internal audits to inventory all ArmorStart® LT devices and verify their firmware versions to identify vulnerable units. 7. Develop incident response plans that include procedures for manual control or fallback operations in case of device unavailability. 8. Educate operational technology (OT) personnel about the risks of exposing ICS devices to scanning and unauthorized access. 9. Consider deploying network anomaly detection solutions tailored for ICS environments to detect early signs of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2025-08-20T19:29:53.474Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696f8f574623b1157c38994e

Added to database: 1/20/2026, 2:21:11 PM

Last enriched: 1/20/2026, 2:36:52 PM

Last updated: 2/6/2026, 11:10:25 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats