Rockwell Automation Arena Simulation Software Remote Code Execution Vulnerability
CVE-2023-29461

7.8HIGH

Key Information:

Vendor
CVE Published:
9 May 2023

Summary

An arbitrary code execution vulnerability has been identified in Rockwell Automation's Arena Simulation software. This vulnerability arises from a memory buffer overflow in the heap, which could be exploited by a malicious user to execute unauthorized code within the application. This exploitation may lead to severe consequences including a complete compromise of the application's confidentiality, integrity, and availability. Organizations using Arena Simulation are advised to review their security measures and apply necessary updates.

Affected Version(s)

Arena Simulation 16.00 <= 16.20

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This vulnerability was reported to Rockwell Automation by Simon Janz working with Trend Micro's Zero Day Initiative.
.