Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Dec 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 19 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. | |
Title | Rockwell Automation Third Party Vulnerability in Arena® | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: Rockwell
Published: 2024-12-19T21:04:52.473Z
Updated: 2024-12-20T17:11:59.565Z
Reserved: 2024-11-18T18:57:30.457Z
Link: CVE-2024-11364
Vulnrichment
Updated: 2024-12-20T17:11:53.324Z
NVD
Status : Received
Published: 2024-12-19T21:15:07.427
Modified: 2024-12-19T21:15:07.427
Link: CVE-2024-11364
Redhat
No data.