CVE-2025-9437
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-14

Last updated on: 2025-10-14

Assigner: Rockwell Automation

Description
A security issue exists within the Studio 5000 Logix Designer add-on profile (AOP) for the ArmorStart Classic distributed motor controller, resulting in denial-of-service. This vulnerability is possible due to the input of invalid values into Component Object Model (COM) methods.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-14
Last Modified
2025-10-14
Generated
2026-05-07
AI Q&A
2025-10-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
rockwellautomation studio_5000_logix_designer 2.05.07
rockwellautomation armorstart_add_on_profile *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-755 The product does not handle or incorrectly handles an exceptional condition.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include following security best practices recommended by Rockwell Automation and contacting their TechConnect support for guidance. Since no corrected software version is currently available, applying any provided workarounds from Rockwell Automation is advised. Monitoring system stability and avoiding input of invalid values into COM methods within the ArmorStart Classic AOP can help reduce risk. [1]


Can you explain this vulnerability to me?

This vulnerability is a high-severity denial-of-service (DoS) issue in the ArmorStart Add-On Profile (AOP) used with the Studio 5000 Logix Designer for ArmorStart Classic distributed motor controllers. It occurs because invalid input values passed to Component Object Model (COM) methods cause uncaught exceptions, which make the system unresponsive. [1]


How can this vulnerability impact me? :

The vulnerability can cause the affected system to become unresponsive due to denial-of-service, potentially disrupting operations that rely on the ArmorStart Classic distributed motor controllers. This could lead to downtime or interruption in motor control processes. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

There are no specific detection commands or network/system detection methods provided for this vulnerability. Detection would likely involve monitoring for unresponsive behavior in the Studio 5000 Logix Designer when using the ArmorStart Classic AOP, especially when invalid input values are passed to COM methods. No explicit commands or tools are suggested in the provided resources. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart