Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-33998 | A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. |
Solution
Corrected in software version 16.20.06 and later Mitigations and Workarounds Customers using the affected software are encouraged to apply these risk mitigations, if possible. For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight to minimize the risk of the vulnerability.
Workaround
No workaround given by the vendor.
Fri, 06 Dec 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation
Rockwellautomation arena |
|
CPEs | cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:* | |
Vendors & Products |
Rockwellautomation
Rockwellautomation arena |
|
Metrics |
cvssV3_1
|
Thu, 05 Dec 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Rockwell Automation Arena® Code Execution Vulnerabilities | Rockwell Automation Arena® Use After Free Vulnerability |
Thu, 05 Dec 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. | |
Title | Rockwell Automation Arena® Code Execution Vulnerabilities | |
Weaknesses | CWE-416 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-12-06T18:58:28.586Z
Reserved: 2024-11-12T17:53:09.239Z
Link: CVE-2024-11155

Updated: 2024-12-06T18:58:22.582Z

Status : Analyzed
Published: 2024-12-05T18:15:20.933
Modified: 2025-04-14T17:17:56.877
Link: CVE-2024-11155

No data.

No data.