A memory corruption vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by corrupting the memory triggering an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-27871 A memory corruption vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by corrupting the memory triggering an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.
Fixes

Solution

Update to v16.20.03 to remediate the issue.


Workaround

* Do not open untrusted files from unknown sources. * For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight  to minimize the risk of the vulnerability.

History

Tue, 17 Dec 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation arena
CPEs cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:* cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*
Vendors & Products Rockwellautomation arena Simulation
Rockwellautomation arena

Mon, 09 Dec 2024 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation
Rockwellautomation arena Simulation
Weaknesses CWE-787
CPEs cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*
Vendors & Products Rockwellautomation
Rockwellautomation arena Simulation

cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-08-06T18:11:07.999Z

Reserved: 2024-03-26T15:39:33.119Z

Link: CVE-2024-2929

cve-icon Vulnrichment

Updated: 2024-08-01T19:32:41.647Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-26T16:15:14.230

Modified: 2024-12-17T16:14:25.233

Link: CVE-2024-2929

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.