Rockwell Automation Arena® suffers from a
stack-based buffer overflow vulnerability. The specific flaw exists within the
parsing of DOE files. Local attackers are able to exploit this issue to
potentially execute arbitrary code on affected installations of Arena®. Exploiting
the vulnerability requires opening a malicious DOE file.
stack-based buffer overflow vulnerability. The specific flaw exists within the
parsing of DOE files. Local attackers are able to exploit this issue to
potentially execute arbitrary code on affected installations of Arena®. Exploiting
the vulnerability requires opening a malicious DOE file.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
Upgrade to version 16.20.11 and later
Workaround
No workaround given by the vendor.
References
History
Fri, 14 Nov 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rockwell Automation Arena® suffers from a stack-based buffer overflow vulnerability. The specific flaw exists within the parsing of DOE files. Local attackers are able to exploit this issue to potentially execute arbitrary code on affected installations of Arena®. Exploiting the vulnerability requires opening a malicious DOE file. | |
| Title | Rockwell Automation Arena® Simulation Stack-Based Buffer Overflow Vulnerability | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2025-11-14T15:44:16.712Z
Reserved: 2025-10-17T14:31:53.014Z
Link: CVE-2025-11918
No data.
Status : Received
Published: 2025-11-14T14:15:45.993
Modified: 2025-11-14T14:15:45.993
Link: CVE-2025-11918
No data.
OpenCVE Enrichment
No data.