An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow. The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. The user would need to open a malicious file provided to them by the attacker for the code to execute.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Dec 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation arena
|
|
CPEs | cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:* | |
Vendors & Products |
Rockwellautomation arena Simulation
|
Rockwellautomation arena
|

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-09-10T14:26:35.022Z
Reserved: 2023-03-06T18:21:21.066Z
Link: CVE-2023-27854

Updated: 2024-08-02T12:23:30.381Z

Status : Analyzed
Published: 2023-10-27T19:15:41.157
Modified: 2024-12-17T16:14:05.870
Link: CVE-2023-27854

No data.