Rockwell Automation Arena Simulation Software Remote Code Execution Vulnerability
CVE-2023-29462

7.8HIGH

Key Information:

Vendor
CVE Published:
9 May 2023

Summary

An arbitrary code execution vulnerability has been identified in Rockwell Automation's Arena Simulation software. This issue arises from a memory buffer overflow in the heap, which could be exploited by attackers to execute unauthorized code within the software environment. Such a breach may lead to severe impacts including loss of confidentiality, integrity, and availability of affected systems, posing significant risks to user data and operations.

Affected Version(s)

Arena Simulation 16.00 <= 16.20

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This vulnerability was reported to Rockwell Automation by Simon Janz working with Trend Micro's Zero Day Initiative.
.