An “out of bounds write” code execution vulnerability exists in the

Rockwell Automation Arena®

that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-34015 An “out of bounds write” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Fixes

Solution

Corrected in software version 16.20.06 and later Mitigations and Workarounds Customers using the affected software are encouraged to apply these risk mitigations, if possible. For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight  to minimize the risk of the vulnerability.


Workaround

No workaround given by the vendor.

History

Tue, 17 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*
Vendors & Products Rockwellautomation arena Simulation

Tue, 10 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation arena
CPEs cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*
Vendors & Products Rockwellautomation arena
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Dec 2024 23:30:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation
Rockwellautomation arena Simulation
CPEs cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*
Vendors & Products Rockwellautomation
Rockwellautomation arena Simulation
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Thu, 05 Dec 2024 17:45:00 +0000

Type Values Removed Values Added
Description An “out of bounds write” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Title Rockwell Automation Arena® Out of Bounds Write Vulnerability
Weaknesses CWE-787
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-12-10T14:47:32.371Z

Reserved: 2024-11-12T17:53:10.796Z

Link: CVE-2024-11156

cve-icon Vulnrichment

Updated: 2024-12-10T14:47:28.098Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-05T18:15:21.103

Modified: 2024-12-17T15:52:01.670

Link: CVE-2024-11156

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.