CVE-2025-9466
📋 TL;DR
A denial-of-service vulnerability in ArmorStart LT industrial motor controllers causes unexpected device reboots when subjected to specific EtherNet/IP and CIP grammar tests. This affects industrial control systems using these devices, potentially disrupting motor operations and process control.
💻 Affected Systems
- ArmorStart LT
📦 What is this software?
Armorstart Lt Firmware by Rockwellautomation
⚠️ Risk & Real-World Impact
Worst Case
Malicious actors could repeatedly trigger reboots, causing extended downtime in critical industrial processes, production line stoppages, and potential safety hazards in automated systems.
Likely Case
Accidental or targeted network traffic could cause temporary device reboots, disrupting motor control for several seconds and requiring manual intervention to restore normal operations.
If Mitigated
With proper network segmentation and traffic filtering, the vulnerability remains dormant with minimal operational impact.
🎯 Exploit Status
Exploitation requires sending specific EtherNet/IP and CIP grammar test packets to the device's network interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Rockwell Automation advisory for specific firmware versions
Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1768.html
Restart Required: Yes
Instructions:
1. Review Rockwell Automation Security Advisory SD1768
2. Download appropriate firmware update from Rockwell Automation website
3. Follow manufacturer's firmware update procedures for ArmorStart LT devices
4. Verify successful update and device functionality
🔧 Temporary Workarounds
Network Segmentation
allIsolate ArmorStart LT devices from untrusted networks and restrict EtherNet/IP traffic to authorized sources only.
Firewall Rules
allImplement firewall rules to block unauthorized EtherNet/IP and CIP traffic to affected devices.
🧯 If You Can't Patch
- Implement strict network access controls to limit EtherNet/IP traffic to trusted sources only.
- Monitor network traffic for unusual EtherNet/IP patterns and device reboot events.
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Rockwell Automation's patched versions list in advisory SD1768.
Check Version:
Use Rockwell Automation programming software or device web interface to check firmware version.
Verify Fix Applied:
Verify firmware version has been updated to patched version and test device stability under normal operating conditions.
📡 Detection & Monitoring
Log Indicators:
- Unexpected device reboots
- Link State Monitor downtime events
- EtherNet/IP connection resets
Network Indicators:
- Unusual EtherNet/IP traffic patterns
- Specific CIP grammar test packets to ArmorStart LT devices
SIEM Query:
Search for: device_reboot events AND source_ip targeting ArmorStart LT devices OR EtherNet/IP protocol anomalies