Loading

ArmorStart® AOP Denial-of-Service Vulnerability

Severity:
High
Advisory ID:
SD1751
Published Date:
October 14, 2025
Last Updated:
October 14, 2025
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
No
Corrected:
Yes
Workaround:
Yes
CVE IDs
CVE-2025-9437
Downloads
The following link(s) provide the security advisory in Vulnerability Exploitability Exchange format:
JSON
Summary

ArmorStart® AOP Denial-of-Service Vulnerability

The security of our products is important to us as your industrial automation supplier. This security issue was found internally during routine testing and is being reported based on our commitment to customer transparency and improvement of all business environments.

 

Product Description

ArmorStart Distributed Motor Controllers are easy-to-deploy, on-machine motor control solutions that simplify installation and support EtherNet/IP™  networks for industrial automation systems.

 

Affected products and solution

Affected Product

CVE

Affected  Software Version

Corrected in Software Version

Affected Catalog Numbers

ArmorStart® AOP

CVE-2025-9437

V2.05.07

Not Available

280E, 281E, 284E

 

Security Issue Details

Category

Details

CVE ID

CVE-2025-9437

Impact

A security issue exists within the Studio 5000 Logix Designer add-on profile (AOP) for the ArmorStart Classic distributed motor controller, resulting in denial-of-service. This vulnerability is possible due to the input of invalid values into Component Object Model (COM) methods. 

CVSS 3.1 Base Score

7.5/10

CVSS 4.0 Base Score

8.7/10

CWEs

CWE-248: Uncaught Exception

Known Exploited Vulnerability

No (Not listed in KEV database)

 

Mitigations and Workarounds

Customers using the affected software should use our security best practices.   

 

Revision History

Revision

Date

Description

1.0

 October 14, 2025

Initial release

 

Get Up-to-Date Product Security Information

Visit the Rockwell Automation security advisories on the Trust Center page to:

·         Subscribe to product security alerts

·         Review the current list of Rockwell Automation security advisories

·         Report a possible security issue in a Rockwell Automation product

·         Learn more about the Rockwell Automation vulnerability policy

 

Support

If you have any questions regarding the security issue(s) above and how to mitigate them, contact TechConnect for help. More information can be found at Contact Us | Rockwell Automation | US.

If you have any questions regarding this disclosure, please contact PSIRT

Email: rasecure@ra.rockwell.com

 

Legal Disclaimer

ROCKWELL AUTOMATION DOES NOT WARRANT THE COMPLETENESS, TIMELINESS OR ACCURACY OF ANY OF THE DATA CONTAINED IN THIS WEB SITE AND MAY MAKE CHANGES THERETO AT ANY TIME IN ITS SOLE DISCRETION WITHOUT NOTICE. FURTHER, ALL INFORMATION CONVEYED HEREBY IS PROVIDED TO USERS "AS IS." IN NO EVENT SHALL ROCKWELL BE LIABLE FOR ANY DAMAGES OF ANY KIND INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS PROFIT OR DAMAGE, EVEN IF ROCKWELL AUTOMATION HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGES. ROCKWELL AUTOMATION DISCLAIMS ALL WARRANTIES WHETHER EXPRESSED OR IMPLIED IN RESPECT OF THE INFORMATION (INCLUDING SOFTWARE) PROVIDED HEREBY, INCLUDING THE IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, AND NON-INFRINGEMENT. Note that certain jurisdictions do not countenance the exclusion of implied warranties; thus, this disclaimer may not apply to you.

ArmorStart® AOP Denial-of-Service Vulnerability

 

The security of our products is important to us as your industrial automation supplier. This security issue was found internally during routine testing and is being reported based on our commitment to customer transparency and improvement of all business environments.

 

Product Description

 

ArmorStart Distributed Motor Controllers are easy-to-deploy, on-machine motor control solutions that simplify installation and support EtherNet/IP™  networks for industrial automation systems.

 

Affected products and solution

 

Affected Product

CVE

Affected  Software Version

Corrected in Software Version

Affected Catalog Numbers

ArmorStart® AOP

CVE-2025-9437

V2.05.07

Not Available

280E, 281E, 284E

 

Security Issue Details

 

Category

Details

CVE ID

CVE-2025-9437

Impact

A security issue exists within the Studio 5000 Logix Designer [MV1] [JC2] [MS3] [JC4] add-on profile (AOP) for the ArmorStart Classic[MS5] [JC6]  distributed motor controller, resulting in denial-of-service. This vulnerability is possible due to the input of invalid values into Component Object Model (COM) methods. 

CVSS 3.1 Base Score

7.5/10

CVSS 4.0 Base Score

8.7/10

CWEs

CWE-248: Uncaught Exception

Known Exploited Vulnerability

No (Not listed in KEV database)

 

 

 

 

Mitigations and Workarounds

 

Customers using the affected software should use our security best practices.   

 

Revision History

 

Revision

Date

Description

1.0

 September 9, 2025

Initial release

 

 

 

 

Get Up-to-Date Product Security Information

 

Visit the Rockwell Automation security advisories on the Trust Center page to:

·         Subscribe to product security alerts

·         Review the current list of Rockwell Automation security advisories

·         Report a possible security issue in a Rockwell Automation product

·         Learn more about the Rockwell Automation vulnerability policy

 

 

Support

 

If you have any questions regarding the security issue(s) above and how to mitigate them, contact TechConnect for help. More information can be found at Contact Us | Rockwell Automation | US.

 

If you have any questions regarding this disclosure, please contact PSIRT

Email: rasecure@ra.rockwell.com

 

Legal Disclaimer

 

ROCKWELL AUTOMATION DOES NOT WARRANT THE COMPLETENESS, TIMELINESS OR ACCURACY OF ANY OF THE DATA CONTAINED IN THIS WEB SITE AND MAY MAKE CHANGES THERETO AT ANY TIME IN ITS SOLE DISCRETION WITHOUT NOTICE. FURTHER, ALL INFORMATION CONVEYED HEREBY IS PROVIDED TO USERS "AS IS." IN NO EVENT SHALL ROCKWELL BE LIABLE FOR ANY DAMAGES OF ANY KIND INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS PROFIT OR DAMAGE, EVEN IF ROCKWELL AUTOMATION HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGES. ROCKWELL AUTOMATION DISCLAIMS ALL WARRANTIES WHETHER EXPRESSED OR IMPLIED IN RESPECT OF THE INFORMATION (INCLUDING SOFTWARE) PROVIDED HEREBY, INCLUDING THE IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, AND NON-INFRINGEMENT. Note that certain jurisdictions do not countenance the exclusion of implied warranties; thus, this disclaimer may not apply to you.

 


 [MV1]@Mike Stegemeyer , Is this in FTDS ? I was under the impression that this s in Logix Designer or CCW AOPs

 [JC2]@Mike Stegemeyer did you see manjus comment?

 [MS3]She's correct.  I fixed it to be Logix Designer.

 [JC4]Its a team effort, thank you all

 [MS5]OPSSDB-6442 is for the products referred to as "ArmorStart Ethernet" or "ArmorStart Classic" - ArmorStart LT is a different set of catalog numbers.  Joe A or someone might be able to chime in with the right name to use here.

 [JC6]Thanks for pointing this out Mike, we wont move forward with disclosure until this is addressed

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Rockwell Automation Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Trust Center Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Security Adv Chevron RightChevron Right
  4. Chevron LeftChevron Left Industrial Security Advisory Detail Chevron RightChevron Right
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our {0} Privacy Policy
CloseClose