CVE-2025-9466

7.5 HIGH

📋 TL;DR

A denial-of-service vulnerability in ArmorStart LT industrial motor controllers causes unexpected device reboots when subjected to specific EtherNet/IP and CIP grammar tests. This affects industrial control systems using these devices, potentially disrupting motor operations and process control.

💻 Affected Systems

Products:
  • ArmorStart LT
Versions: All versions prior to firmware update
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with EtherNet/IP connectivity enabled and exposed to the specific grammar test traffic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious actors could repeatedly trigger reboots, causing extended downtime in critical industrial processes, production line stoppages, and potential safety hazards in automated systems.

🟠

Likely Case

Accidental or targeted network traffic could cause temporary device reboots, disrupting motor control for several seconds and requiring manual intervention to restore normal operations.

🟢

If Mitigated

With proper network segmentation and traffic filtering, the vulnerability remains dormant with minimal operational impact.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: MEDIUM with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific EtherNet/IP and CIP grammar test packets to the device's network interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Rockwell Automation advisory for specific firmware versions

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1768.html

Restart Required: Yes

Instructions:

1. Review Rockwell Automation Security Advisory SD1768
2. Download appropriate firmware update from Rockwell Automation website
3. Follow manufacturer's firmware update procedures for ArmorStart LT devices
4. Verify successful update and device functionality

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ArmorStart LT devices from untrusted networks and restrict EtherNet/IP traffic to authorized sources only.

Firewall Rules

all

Implement firewall rules to block unauthorized EtherNet/IP and CIP traffic to affected devices.

🧯 If You Can't Patch

  • Implement strict network access controls to limit EtherNet/IP traffic to trusted sources only.
  • Monitor network traffic for unusual EtherNet/IP patterns and device reboot events.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Rockwell Automation's patched versions list in advisory SD1768.

Check Version:

Use Rockwell Automation programming software or device web interface to check firmware version.

Verify Fix Applied:

Verify firmware version has been updated to patched version and test device stability under normal operating conditions.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Link State Monitor downtime events
  • EtherNet/IP connection resets

Network Indicators:

  • Unusual EtherNet/IP traffic patterns
  • Specific CIP grammar test packets to ArmorStart LT devices

SIEM Query:

Search for: device_reboot events AND source_ip targeting ArmorStart LT devices OR EtherNet/IP protocol anomalies

🔗 References

📤 Share & Export