CVE-2025-9278: CWE-400 Uncontrolled Resource Consumption in Rockwell Automation ArmorStart® LT
A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. After running a Burp Suite active scan, the device loses ICMP connectivity, causing the web application to become inaccessible.
AI Analysis
Technical Summary
CVE-2025-9278 is a vulnerability identified in Rockwell Automation's ArmorStart® LT product, specifically affecting versions 2.002 and earlier. The issue is classified under CWE-400, which pertains to uncontrolled resource consumption leading to denial-of-service conditions. The vulnerability manifests when an attacker performs an active scan using tools like Burp Suite against the device's web application interface. This scanning activity causes the device to lose ICMP connectivity, effectively making the device unreachable via ping and rendering the web application inaccessible. The root cause is likely due to insufficient input validation or resource management within the web application or underlying services, allowing resource exhaustion under certain request patterns. The CVSS 4.0 base score is 8.7, reflecting a high severity with network attack vector (AV:N), no required privileges (PR:N), no user interaction (UI:N), and a high impact on availability (VA:H). The vulnerability does not affect confidentiality or integrity, but the loss of availability can disrupt industrial processes controlled by ArmorStart® LT. No authentication is required to exploit this vulnerability, and no known exploits have been reported in the wild as of the publication date. No patches or official remediation guidance have been released yet by Rockwell Automation, indicating that affected organizations must rely on interim mitigations. The vulnerability highlights the risks of exposing industrial control system (ICS) devices to untrusted networks and the importance of robust resource management in embedded web applications.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors relying on Rockwell Automation's ArmorStart® LT, this vulnerability poses a significant risk of operational disruption. The denial-of-service condition can halt automated processes, leading to production downtime, safety risks, and financial losses. Loss of ICMP connectivity and web interface access complicates remote management and incident response. Since ArmorStart® LT is used in industrial automation, availability is critical; any disruption can cascade into broader supply chain impacts. The lack of authentication requirement and ease of exploitation increase the threat level, especially if devices are exposed to external or less-secure internal networks. Although no known exploits exist yet, the vulnerability could be targeted by threat actors aiming to disrupt European industrial operations or conduct ransomware attacks by first disabling control systems. The impact is thus not only operational but also strategic, affecting national infrastructure resilience and economic stability.
Mitigation Recommendations
1. Immediately restrict network access to ArmorStart® LT devices by implementing strict firewall rules and network segmentation to isolate these devices from untrusted or general-purpose networks. 2. Disable or limit exposure of the web application interface to only trusted management networks or VPNs. 3. Monitor network traffic for scanning activity, especially from tools like Burp Suite or unusual ICMP traffic patterns, and block suspicious sources. 4. Implement rate limiting or intrusion prevention systems (IPS) that can detect and mitigate resource exhaustion attempts. 5. Coordinate with Rockwell Automation for updates on patches or firmware upgrades addressing this vulnerability and plan timely deployment once available. 6. Conduct internal audits to inventory all ArmorStart® LT devices and verify their firmware versions to identify vulnerable units. 7. Develop incident response plans that include procedures for manual control or fallback operations in case of device unavailability. 8. Educate operational technology (OT) personnel about the risks of exposing ICS devices to scanning and unauthorized access. 9. Consider deploying network anomaly detection solutions tailored for ICS environments to detect early signs of exploitation attempts.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Sweden
CVE-2025-9278: CWE-400 Uncontrolled Resource Consumption in Rockwell Automation ArmorStart® LT
Description
A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. After running a Burp Suite active scan, the device loses ICMP connectivity, causing the web application to become inaccessible.
AI-Powered Analysis
Technical Analysis
CVE-2025-9278 is a vulnerability identified in Rockwell Automation's ArmorStart® LT product, specifically affecting versions 2.002 and earlier. The issue is classified under CWE-400, which pertains to uncontrolled resource consumption leading to denial-of-service conditions. The vulnerability manifests when an attacker performs an active scan using tools like Burp Suite against the device's web application interface. This scanning activity causes the device to lose ICMP connectivity, effectively making the device unreachable via ping and rendering the web application inaccessible. The root cause is likely due to insufficient input validation or resource management within the web application or underlying services, allowing resource exhaustion under certain request patterns. The CVSS 4.0 base score is 8.7, reflecting a high severity with network attack vector (AV:N), no required privileges (PR:N), no user interaction (UI:N), and a high impact on availability (VA:H). The vulnerability does not affect confidentiality or integrity, but the loss of availability can disrupt industrial processes controlled by ArmorStart® LT. No authentication is required to exploit this vulnerability, and no known exploits have been reported in the wild as of the publication date. No patches or official remediation guidance have been released yet by Rockwell Automation, indicating that affected organizations must rely on interim mitigations. The vulnerability highlights the risks of exposing industrial control system (ICS) devices to untrusted networks and the importance of robust resource management in embedded web applications.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors relying on Rockwell Automation's ArmorStart® LT, this vulnerability poses a significant risk of operational disruption. The denial-of-service condition can halt automated processes, leading to production downtime, safety risks, and financial losses. Loss of ICMP connectivity and web interface access complicates remote management and incident response. Since ArmorStart® LT is used in industrial automation, availability is critical; any disruption can cascade into broader supply chain impacts. The lack of authentication requirement and ease of exploitation increase the threat level, especially if devices are exposed to external or less-secure internal networks. Although no known exploits exist yet, the vulnerability could be targeted by threat actors aiming to disrupt European industrial operations or conduct ransomware attacks by first disabling control systems. The impact is thus not only operational but also strategic, affecting national infrastructure resilience and economic stability.
Mitigation Recommendations
1. Immediately restrict network access to ArmorStart® LT devices by implementing strict firewall rules and network segmentation to isolate these devices from untrusted or general-purpose networks. 2. Disable or limit exposure of the web application interface to only trusted management networks or VPNs. 3. Monitor network traffic for scanning activity, especially from tools like Burp Suite or unusual ICMP traffic patterns, and block suspicious sources. 4. Implement rate limiting or intrusion prevention systems (IPS) that can detect and mitigate resource exhaustion attempts. 5. Coordinate with Rockwell Automation for updates on patches or firmware upgrades addressing this vulnerability and plan timely deployment once available. 6. Conduct internal audits to inventory all ArmorStart® LT devices and verify their firmware versions to identify vulnerable units. 7. Develop incident response plans that include procedures for manual control or fallback operations in case of device unavailability. 8. Educate operational technology (OT) personnel about the risks of exposing ICS devices to scanning and unauthorized access. 9. Consider deploying network anomaly detection solutions tailored for ICS environments to detect early signs of exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Rockwell
- Date Reserved
- 2025-08-20T19:29:53.474Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696f8f574623b1157c38994e
Added to database: 1/20/2026, 2:21:11 PM
Last enriched: 1/20/2026, 2:36:52 PM
Last updated: 2/6/2026, 11:10:25 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.