Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Subscriptions

Vendors Products
Microsoft Subscribe
Windows Subscribe
Rockwellautomation Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-34305 Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Fixes

Solution

V16.20.07 and later


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00012}

epss

{'score': 0.00013}


Fri, 11 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
CPEs cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:x32:* cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*
Vendors & Products Microsoft
Microsoft windows

Tue, 21 Jan 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation
Rockwellautomation arena
Weaknesses CWE-908
CPEs cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:x32:*
Vendors & Products Rockwellautomation
Rockwellautomation arena
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Fri, 20 Dec 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Description Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Title Rockwell Automation Third Party Vulnerability in Arena®
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2025-03-20T18:03:57.750Z

Reserved: 2024-11-18T18:57:30.457Z

Link: CVE-2024-11364

cve-icon Vulnrichment

Updated: 2024-12-20T17:11:53.324Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-19T21:15:07.427

Modified: 2025-07-11T20:03:34.080

Link: CVE-2024-11364

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses