A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-51046 A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Fixes

Solution

Mitigations and Workarounds Customers using the affected software are encouraged to apply these risk mitigations, if possible. *       Do not load untrusted Arena® model files. *       Hold the control key down when loading files to help prevent the VBA file stream from loading.


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00011}

epss

{'score': 0.00012}


Thu, 03 Apr 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Rockwellautomation
Rockwellautomation arena
CPEs cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*
Vendors & Products Microsoft
Microsoft windows
Rockwellautomation
Rockwellautomation arena
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


Fri, 20 Dec 2024 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Description A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Title Rockwell Automation Third Party Vulnerability in Arena®
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-12-20T17:14:12.572Z

Reserved: 2024-12-16T15:33:54.996Z

Link: CVE-2024-12672

cve-icon Vulnrichment

Updated: 2024-12-20T17:14:05.728Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-19T21:15:07.627

Modified: 2025-04-03T16:36:30.507

Link: CVE-2024-12672

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.