Lucene search

K
cveRockwellCVE-2024-21912
HistoryMar 26, 2024 - 4:15 p.m.

CVE-2024-21912

2024-03-2616:15:10
CWE-787
Rockwell
web.nvd.nist.gov
32
arbitrary code execution
rockwell automation
arena simulation
unauthorized code insertion
memory access violation
access violation
threat actor
system compromise
confidentiality compromise
integrity compromise
availability compromise
malicious file.

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.0%

An arbitrary code execution vulnerability in Rockwell Automation Arena Simulation could let a malicious user insert unauthorized code into the software. This is done by writing beyond the designated memory area, which causes an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Arena Simulation",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "Version 16.00 - 16.20.02"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.0%

Related for CVE-2024-21912