Rockwell Automation Arena®
that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-34015 | An “out of bounds write” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. |
Solution
Corrected in software version 16.20.06 and later Mitigations and Workarounds Customers using the affected software are encouraged to apply these risk mitigations, if possible. For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight to minimize the risk of the vulnerability.
Workaround
No workaround given by the vendor.
Tue, 17 Dec 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Rockwellautomation arena Simulation
|
Tue, 10 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rockwellautomation arena
|
|
| CPEs | cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rockwellautomation arena
|
|
| Metrics |
ssvc
|
Mon, 09 Dec 2024 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rockwellautomation
Rockwellautomation arena Simulation |
|
| CPEs | cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rockwellautomation
Rockwellautomation arena Simulation |
|
| Metrics |
cvssV3_1
|
Thu, 05 Dec 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An “out of bounds write” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. | |
| Title | Rockwell Automation Arena® Out of Bounds Write Vulnerability | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-12-10T14:47:32.371Z
Reserved: 2024-11-12T17:53:10.796Z
Link: CVE-2024-11156
Updated: 2024-12-10T14:47:28.098Z
Status : Analyzed
Published: 2024-12-05T18:15:21.103
Modified: 2024-12-17T15:52:01.670
Link: CVE-2024-11156
No data.
OpenCVE Enrichment
No data.
EUVD