Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9465: CWE-400 Uncontrolled Resource Consumption in Rockwell Automation ArmorStart® LT

0
High
VulnerabilityCVE-2025-9465cvecve-2025-9465cwe-400
Published: Tue Jan 20 2026 (01/20/2026, 13:51:36 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: ArmorStart® LT

Description

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. During execution of the Achilles Comprehensive grammar tests, the device reboots unexpectedly, causing the Link State Monitor to go down for several seconds.

AI-Powered Analysis

AILast updated: 01/20/2026, 14:20:28 UTC

Technical Analysis

CVE-2025-9465 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Rockwell Automation's ArmorStart® LT product, specifically versions V2.002 and earlier. The flaw manifests during the execution of Achilles Comprehensive grammar tests, which are likely diagnostic or compliance tests used to validate device behavior. When these tests run, the device unexpectedly reboots, causing a temporary denial-of-service condition by bringing down the Link State Monitor for several seconds. The Link State Monitor is critical for maintaining network link status and connectivity in industrial control environments. The vulnerability can be triggered remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). This means an attacker with network access could cause repeated reboots, disrupting device availability and potentially affecting dependent control systems. Although no public exploits have been reported yet, the high CVSS score of 8.7 reflects the significant risk posed by this vulnerability. The lack of a patch at the time of publication means affected organizations must rely on compensating controls until a fix is released. The vulnerability impacts operational integrity and availability, which are critical in industrial automation contexts where ArmorStart® LT is deployed.

Potential Impact

For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a risk of operational disruption. ArmorStart® LT devices are used to manage and monitor industrial processes; unexpected reboots and downtime of the Link State Monitor can lead to loss of visibility and control over network links, potentially causing cascading failures or safety risks. The denial-of-service condition could interrupt production lines, delay processes, or cause safety systems to malfunction temporarily. Given the remote exploitability without authentication, attackers could leverage this vulnerability to cause targeted disruptions or as part of a broader attack on industrial control systems. The impact is particularly severe in environments requiring high availability and real-time monitoring, common in European industrial hubs. Additionally, regulatory compliance frameworks in Europe emphasize operational continuity and cybersecurity, so exploitation could also lead to compliance violations and reputational damage.

Mitigation Recommendations

1. Monitor network traffic for unusual or unauthorized execution of Achilles Comprehensive grammar tests to detect potential exploitation attempts. 2. Implement strict network segmentation to isolate ArmorStart® LT devices from untrusted networks and limit access to only authorized personnel and systems. 3. Apply strict firewall rules and intrusion detection/prevention systems (IDS/IPS) to block or alert on suspicious packets targeting ArmorStart® LT devices. 4. Coordinate with Rockwell Automation for timely updates and patches; prioritize upgrading ArmorStart® LT to versions above V2.002 once a patch is available. 5. Conduct regular device and network audits to ensure no unauthorized changes or test executions occur. 6. Develop incident response plans specific to industrial control system disruptions, including fallback procedures during device reboots or monitoring outages. 7. Educate operational technology (OT) staff about this vulnerability and signs of exploitation to enhance early detection and response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2025-08-25T14:52:59.286Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696f8bc44623b1157c38086e

Added to database: 1/20/2026, 2:05:56 PM

Last enriched: 1/20/2026, 2:20:28 PM

Last updated: 1/20/2026, 6:49:53 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats