CERT AdvisoriesLow

Rockwell Automation 432ES-IG3 Series A Vulnerability Exposes OT Systems to DoS Risks

2 min readSource: CISA Cybersecurity Advisories
CVE-2025-9368

CISA warns of CVE-2025-9368 in Rockwell Automation 432ES-IG3 Series A, enabling denial-of-service attacks on industrial control systems. Patch now.

Rockwell Automation 432ES-IG3 Series A Vulnerability Identified

The Cybersecurity and Infrastructure Security Agency (CISA) has disclosed a critical vulnerability in Rockwell Automation’s 432ES-IG3 Series A industrial control system (ICS) component. Tracked as CVE-2025-9368, the flaw could allow threat actors to trigger a denial-of-service (DoS) condition, disrupting operations in affected environments.

Technical Details

The vulnerability affects the following version of the Rockwell Automation 432ES-IG3 Series A:

  • 432ES-IG3 Series A (CVE-2025-9368)

While CISA’s advisory does not provide specific technical details about the exploit mechanism, the Common Vulnerability Scoring System (CVSS) metrics (pending at the time of publication) will likely assess the severity once additional information is available. The advisory references a CSAF (Common Security Advisory Framework) document for further technical context, accessible here.

Impact Analysis

Successful exploitation of CVE-2025-9368 could lead to a DoS condition, rendering the affected 432ES-IG3 Series A device unresponsive. In operational technology (OT) environments, such disruptions can cascade into broader system outages, potentially halting critical industrial processes. Given the device’s role in industrial control systems, this vulnerability poses a moderate-to-high risk to organizations relying on Rockwell Automation infrastructure.

Recommendations

CISA urges organizations using the 432ES-IG3 Series A to:

  1. Apply patches or mitigations provided by Rockwell Automation as soon as they become available.
  2. Monitor network traffic for anomalous activity targeting the affected device.
  3. Implement network segmentation to limit exposure of OT systems to potential attackers.
  4. Review CISA’s advisory (ICSA-26-013-01) and the linked CSAF document for updates on CVSS scoring and mitigation strategies.

Organizations should prioritize this vulnerability in their patch management cycles, particularly in sectors where Rockwell Automation systems are deployed, such as manufacturing, energy, and critical infrastructure.

For further details, refer to the original CISA advisory.

Share