An “out of bounds read” code execution vulnerability exists in the Rockwell Automation Arena®

that could allow a threat actor to craft a DOE file and force the software to read beyond the boundaries of an allocated memory. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-50619 An “out of bounds read” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to read beyond the boundaries of an allocated memory. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Fixes

Solution

Corrected in v16.20.06 and later.  Customers using the affected software are encouraged to apply these risk mitigations, if possible. For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight  to minimize the risk of the vulnerability.


Workaround

No workaround given by the vendor.

History

Tue, 17 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation arena
CPEs cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:* cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*
Vendors & Products Rockwellautomation arena Simulation
Rockwellautomation arena

Tue, 10 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Dec 2024 23:30:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation
Rockwellautomation arena Simulation
CPEs cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*
Vendors & Products Rockwellautomation
Rockwellautomation arena Simulation
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Thu, 05 Dec 2024 18:00:00 +0000

Type Values Removed Values Added
Description An “out of bounds read” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to read beyond the boundaries of an allocated memory. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Title Rockwell Automation Arena® Out of Bounds Read Vulnerability
Weaknesses CWE-125
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-12-10T15:01:30.054Z

Reserved: 2024-12-04T01:26:01.833Z

Link: CVE-2024-12130

cve-icon Vulnrichment

Updated: 2024-12-10T15:01:26.283Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-05T18:15:21.507

Modified: 2024-12-17T15:52:01.670

Link: CVE-2024-12130

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.