Rockwellautomation Arena (Arena Simulation Software) 16.20.04

CPE Details

Rockwellautomation Arena (Arena Simulation Software) 16.20.04
16.20.04
2024-12-17
14h50 +00:00
2024-12-17
14h56 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:rockwellautomation:arena:16.20.04:*:*:*:*:*:*:*

Informations

Vendor

rockwellautomation

Product

arena

Version

16.20.04

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-12672 2024-12-19 20h58 +00:00 A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
8.5
High
CVE-2024-12175 2024-12-19 20h53 +00:00 Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
8.5
High
CVE-2024-11157 2024-12-19 20h48 +00:00 A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
8.5
High
CVE-2024-11155 2024-12-05 17h32 +00:00 A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
8.5
High
CVE-2024-21920 2024-03-26 15h48 +00:00 A memory buffer vulnerability in Rockwell Automation Arena Simulation could potentially let a threat actor read beyond the intended memory boundaries. This could reveal sensitive information and even cause the application to crash, resulting in a denial-of-service condition. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.
7.1
High