Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9280: CWE-400 Uncontrolled Resource Consumption in Rockwell Automation ArmorStart® LT

0
High
VulnerabilityCVE-2025-9280cvecve-2025-9280cwe-400
Published: Tue Jan 20 2026 (01/20/2026, 13:57:02 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: ArmorStart® LT

Description

CVE-2025-9280 is a high-severity vulnerability in Rockwell Automation's ArmorStart® LT (version 2. 002 and below) that allows an unauthenticated attacker to cause a denial-of-service (DoS) condition by triggering uncontrolled resource consumption. The issue was discovered through fuzz testing with Defensics, which causes the device to become unresponsive and require a reboot. This vulnerability does not require user interaction or privileges and can be exploited remotely over the network. No known exploits are currently in the wild. The impact primarily affects availability, potentially disrupting industrial control processes that rely on ArmorStart® LT devices. European organizations using this product in critical infrastructure or manufacturing sectors are at risk. Mitigation involves monitoring for abnormal device behavior and applying patches or updates once available. Countries with significant industrial automation deployments, such as Germany, France, Italy, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/20/2026, 14:36:17 UTC

Technical Analysis

CVE-2025-9280 identifies a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) in Rockwell Automation's ArmorStart® LT product, specifically versions 2.002 and earlier. The vulnerability allows an attacker to induce a denial-of-service condition by sending malformed or unexpected inputs, as demonstrated through fuzz testing with Defensics. This causes the device to consume excessive resources, leading to unresponsiveness and requiring a manual reboot to restore functionality. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score of 8.7 reflects a high severity due to the ease of exploitation (network vector, no privileges required) and the significant impact on availability (high impact on availability). The vulnerability does not affect confidentiality or integrity. ArmorStart® LT is used in industrial automation environments, often within critical infrastructure and manufacturing sectors, where device availability is crucial for operational continuity. No patches or exploit code are currently publicly available, but the risk remains significant due to the potential operational disruption. The vulnerability highlights the importance of robust input validation and resource management in embedded industrial control devices.

Potential Impact

The primary impact of CVE-2025-9280 is a denial-of-service condition that affects the availability of ArmorStart® LT devices. For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors relying on Rockwell Automation products, this could lead to operational downtime, production delays, and potential safety risks if automated processes are interrupted. The unavailability of these devices may disrupt industrial control systems, causing cascading effects on supply chains and service delivery. Given the remote and unauthenticated nature of the exploit, attackers could target vulnerable devices from outside the network perimeter, increasing the threat surface. Although no known exploits are currently in the wild, the high CVSS score indicates a strong potential for future exploitation, which could impact European industries heavily dependent on industrial automation technologies.

Mitigation Recommendations

1. Implement network segmentation to isolate ArmorStart® LT devices from general IT networks and limit exposure to untrusted networks. 2. Monitor device behavior and network traffic for signs of abnormal resource consumption or unresponsiveness, using industrial control system (ICS) monitoring tools. 3. Apply strict input validation and filtering at network boundaries to block malformed or unexpected packets targeting ArmorStart® LT devices. 4. Engage with Rockwell Automation for updates or patches addressing this vulnerability and plan for timely deployment once available. 5. Develop and test incident response procedures to quickly reboot or restore affected devices to minimize downtime. 6. Conduct regular vulnerability assessments and penetration testing focused on industrial control systems to identify similar weaknesses. 7. Maintain an inventory of all ArmorStart® LT devices and their firmware versions to prioritize remediation efforts. 8. Educate operational technology (OT) personnel about this vulnerability and encourage vigilance for signs of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2025-08-20T19:41:53.395Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696f8f574623b1157c389954

Added to database: 1/20/2026, 2:21:11 PM

Last enriched: 1/20/2026, 2:36:17 PM

Last updated: 1/20/2026, 4:06:57 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats