Rockwell Automation Arena Simulation Software Remote Code Execution Vulnerability
CVE-2023-29462
7.8HIGH
Summary
An arbitrary code execution vulnerability has been identified in Rockwell Automation's Arena Simulation software. This issue arises from a memory buffer overflow in the heap, which could be exploited by attackers to execute unauthorized code within the software environment. Such a breach may lead to severe impacts including loss of confidentiality, integrity, and availability of affected systems, posing significant risks to user data and operations.
Affected Version(s)
Arena Simulation 16.00 <= 16.20
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
This vulnerability was reported to Rockwell Automation by Simon Janz working with Trend Micro's Zero Day Initiative.