An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow. The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. The user would need to open a malicious file provided to them by the attacker for the code to execute.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-31589 | An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow. The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. The user would need to open a malicious file provided to them by the attacker for the code to execute. |
Fixes
Solution
* Upgrade to 16.20.02 which has been patched to mitigate these issues, by referencing BF29820 - Patch: ZDI Security Patch & Windows 11 updates , Arena 16.2 https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141044 .
Workaround
No workaround given by the vendor.
References
History
Tue, 17 Dec 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation arena
|
|
CPEs | cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:* | |
Vendors & Products |
Rockwellautomation arena Simulation
|
Rockwellautomation arena
|

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-09-10T14:26:35.022Z
Reserved: 2023-03-06T18:21:21.066Z
Link: CVE-2023-27854

Updated: 2024-08-02T12:23:30.381Z

Status : Analyzed
Published: 2023-10-27T19:15:41.157
Modified: 2024-12-17T16:14:05.870
Link: CVE-2023-27854

No data.

No data.