Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9368: CWE-770: Allocation of Resources Without Limits or Throttling in Rockwell Automation 432ES-IG3 Series A

0
High
VulnerabilityCVE-2025-9368cvecve-2025-9368cwe-770
Published: Tue Dec 09 2025 (12/09/2025, 14:01:03 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: 432ES-IG3 Series A

Description

A security issue exists within 432ES-IG3 Series A, which affects GuardLink® EtherNet/IP Interface, resulting in denial-of-service. A manual power cycle is required to recover the device.

AI-Powered Analysis

AILast updated: 12/09/2025, 14:35:04 UTC

Technical Analysis

CVE-2025-9368 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without limits or throttling, found in Rockwell Automation's 432ES-IG3 Series A GuardLink® EtherNet/IP Interface. This flaw allows an unauthenticated remote attacker to trigger a denial-of-service condition by overwhelming the device's resource allocation mechanisms. The device, running firmware version 1.001, fails to properly limit resource consumption, causing it to become unresponsive and requiring a manual power cycle to restore functionality. The vulnerability is exploitable over the network without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score of 8.7 reflects the ease of exploitation and the high impact on availability. Although no public exploits or patches are currently available, the vulnerability poses a significant threat to industrial environments relying on this hardware for critical communications. The GuardLink® EtherNet/IP Interface is commonly used in industrial automation for secure communication between controllers and devices, making this vulnerability particularly concerning for operational technology (OT) networks. Attackers could leverage this flaw to disrupt industrial processes, potentially causing downtime, safety hazards, and financial losses.

Potential Impact

For European organizations, especially those operating in manufacturing, energy, and critical infrastructure sectors, this vulnerability presents a substantial risk. Disruption of the 432ES-IG3 Series A devices can lead to operational downtime, impacting production lines and industrial processes. The requirement for manual power cycling to recover devices means that automated recovery is not possible, increasing mean time to repair (MTTR) and potentially causing prolonged outages. Given the reliance on Rockwell Automation products in European industrial environments, this could affect supply chains and critical services. The vulnerability's remote exploitability without authentication means attackers can launch DoS attacks from outside the network perimeter if proper controls are not in place. This could also be leveraged as part of a broader attack campaign targeting industrial control systems (ICS), raising concerns about safety and regulatory compliance within the EU. The lack of patches increases the urgency for proactive mitigation measures.

Mitigation Recommendations

1. Implement strict network segmentation to isolate the 432ES-IG3 devices from general IT networks and limit exposure to untrusted networks. 2. Deploy firewall rules and access control lists (ACLs) to restrict incoming traffic to only trusted sources and protocols necessary for device operation. 3. Monitor network traffic for unusual patterns or spikes that could indicate attempts to exploit resource allocation. 4. Establish incident response procedures to quickly identify and manually power cycle affected devices if a DoS condition occurs. 5. Engage with Rockwell Automation for updates and patches, and plan for timely deployment once available. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous traffic targeting EtherNet/IP interfaces. 7. Conduct regular security assessments and penetration tests focusing on OT environments to identify similar vulnerabilities. 8. Train operational staff on recognizing symptoms of device unavailability and recovery procedures to minimize downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2025-08-22T18:31:43.046Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6938301129cea75c35ac7daa

Added to database: 12/9/2025, 2:20:01 PM

Last enriched: 12/9/2025, 2:35:04 PM

Last updated: 12/11/2025, 7:09:55 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats