Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9283: CWE-400 Uncontrolled Resource Consumption in Rockwell Automation ArmorStart® LT

0
High
VulnerabilityCVE-2025-9283cvecve-2025-9283cwe-400
Published: Tue Jan 20 2026 (01/20/2026, 13:59:56 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: ArmorStart® LT

Description

CVE-2025-9283 is a high-severity vulnerability in Rockwell Automation's ArmorStart® LT (versions V2. 002 and below) that leads to uncontrolled resource consumption resulting in denial-of-service (DoS). The issue is triggered during the execution of the Achilles EtherNet/IP Step Limits Storms tests, causing the device to reboot unexpectedly. This reboot causes the Link State Monitor to be unavailable for several seconds, potentially disrupting industrial network communications. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. Although no known exploits are currently in the wild, the high CVSS score of 8. 7 indicates significant risk. European organizations relying on Rockwell Automation products in critical industrial control systems (ICS) and manufacturing environments are at risk of operational disruption. Mitigation involves updating to versions above V2. 002 once patches are available, implementing network segmentation, and monitoring for abnormal device reboots.

AI-Powered Analysis

AILast updated: 01/20/2026, 14:35:32 UTC

Technical Analysis

CVE-2025-9283 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Rockwell Automation's ArmorStart® LT product, specifically versions V2.002 and below. The flaw manifests during the execution of the Achilles EtherNet/IP Step Limits Storms tests, which are designed to evaluate device resilience under network stress conditions. When these tests are run, the device experiences unexpected reboots, causing a temporary outage of the Link State Monitor component for several seconds. This behavior indicates that the device's resource management is insufficient to handle certain network traffic patterns, leading to a denial-of-service condition. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing the attack surface. The CVSS v4.0 score of 8.7 reflects a high severity due to the network attack vector, low attack complexity, and the significant impact on availability (denial of service). Although no public exploits are known at this time, the vulnerability poses a threat to industrial control systems that depend on continuous network monitoring and device availability. The lack of a patch at the time of reporting necessitates immediate risk mitigation through network controls and monitoring.

Potential Impact

For European organizations, particularly those operating in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability could cause significant operational disruptions. The unexpected device reboots and temporary loss of the Link State Monitor can interrupt industrial network communications, potentially halting production lines or critical processes. This may lead to financial losses, safety risks, and reduced reliability of industrial control systems. The impact is heightened in environments where ArmorStart® LT devices are integral to network health monitoring and control. Given the remote and unauthenticated nature of the exploit, attackers could cause widespread denial-of-service conditions across multiple devices, amplifying the disruption. The temporary downtime of the Link State Monitor could also obscure detection of other network issues or attacks, compounding security risks.

Mitigation Recommendations

1. Monitor Rockwell Automation communications channels for official patches or firmware updates addressing CVE-2025-9283 and apply them promptly once available. 2. Implement strict network segmentation to isolate ArmorStart® LT devices from untrusted or less secure network segments, limiting exposure to potential attackers. 3. Deploy intrusion detection and prevention systems (IDS/IPS) tuned to detect abnormal EtherNet/IP traffic patterns, particularly those resembling the Achilles Step Limits Storms tests. 4. Continuously monitor device logs and network behavior for signs of unexpected reboots or Link State Monitor outages to enable rapid incident response. 5. Restrict access to management interfaces of ArmorStart® LT devices to authorized personnel and trusted network zones only. 6. Conduct regular security assessments and penetration testing focused on industrial control system components to identify and remediate similar resource exhaustion vulnerabilities. 7. Develop and test incident response plans that include scenarios involving denial-of-service conditions in ICS environments to minimize downtime and operational impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2025-08-20T19:48:20.042Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696f8f574623b1157c38995d

Added to database: 1/20/2026, 2:21:11 PM

Last enriched: 1/20/2026, 2:35:32 PM

Last updated: 1/20/2026, 4:06:39 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats