Rockwell Automation Arena Simulation Software Remote Code Execution Vulnerability
CVE-2023-29460

7.8HIGH

Key Information:

Vendor
CVE Published:
9 May 2023

Summary

An arbitrary code execution vulnerability exists in Rockwell Automation's Arena Simulation software, enabling potential attackers to execute unauthorized code through a memory buffer overflow. This flaw could lead to severe outcomes, including a complete compromise of the system's confidentiality, integrity, and availability. Organizations using Arena Simulation should prioritize assessing their exposure to this vulnerability and apply available security patches.

Affected Version(s)

Arena Simulation 16.00 <= 16.20

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This vulnerability was reported to Rockwell Automation by Simon Janz working with Trend Micro's Zero Day Initiative.
.