A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Dec 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. | |
Title | Rockwell Automation Third Party Vulnerability in Arena | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: Rockwell
Published: 2024-12-19T20:48:35.802Z
Updated: 2024-12-24T16:40:31.910Z
Reserved: 2024-11-12T17:53:12.233Z
Link: CVE-2024-11157
Vulnrichment
Updated: 2024-12-24T16:40:28.214Z
NVD
Status : Received
Published: 2024-12-19T21:15:07.283
Modified: 2024-12-19T21:15:07.283
Link: CVE-2024-11157
Redhat
No data.