Rockwell Automation Arena Simulation contains an arbitrary code execution vulnerability that could potentially allow a malicious user to commit unauthorized code to the software by using an uninitialized pointer in the application. The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. The user would need to open a malicious file provided to them by the attacker for the code to execute.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-31593 | Rockwell Automation Arena Simulation contains an arbitrary code execution vulnerability that could potentially allow a malicious user to commit unauthorized code to the software by using an uninitialized pointer in the application. The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. The user would need to open a malicious file provided to them by the attacker for the code to execute. |
Fixes
Solution
* Upgrade to 16.20.02 which has been patched to mitigate these issues, by referencing BF29820 - Patch: ZDI Security Patch & Windows 11 updates , Arena 16.2 https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141044 .
Workaround
No workaround given by the vendor.
References
History
Tue, 17 Dec 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation arena
|
|
CPEs | cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:* | |
Vendors & Products |
Rockwellautomation arena Simulation
|
Rockwellautomation arena
|

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-09-09T19:48:57.646Z
Reserved: 2023-03-06T18:21:21.067Z
Link: CVE-2023-27858

Updated: 2024-08-02T12:23:30.373Z

Status : Analyzed
Published: 2023-10-27T19:15:41.230
Modified: 2024-12-17T16:13:20.770
Link: CVE-2023-27858

No data.

No data.