

Rockwell Automation 432ES-IG3 Series A
Published:
13 January 2026 at 12:00:00
Alert date:
13 January 2026 at 19:02:07
Source:
cisa.gov
Critical Infrastructure, Network Infrastructure
A denial-of-service vulnerability (CVE-2025-9368) affects Rockwell Automation 432ES-IG3 Series A GuardLink EtherNet/IP Interface. The vulnerability involves allocation of resources without limits or throttling, with CVSS score 7.5 (HIGH). Exploitation results in denial-of-service requiring manual power cycle to recover. Affected version V1.001 should be upgraded to V2.001.9 or later. The vulnerability impacts critical manufacturing infrastructure worldwide and was reported by Rockwell Automation to CISA.
Technical details
Mitigation steps:
Affected products:
Rockwell Automation 432ES-IG3 Series A
Related links:
https://www.cisa.gov/news-events/ics-advisories/icsa-26-013-01
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-013-01.json
https://www.cve.org/CVERecord?id=CVE-2025-9368
https://cwe.mitre.org/data/definitions/770.html
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
https://www.cisa.gov/notification
https://www.cisa.gov/privacy-policy
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.

