First published: Fri Oct 27 2023(Updated: )
An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow. The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. The user would need to open a malicious file provided to them by the attacker for the code to execute.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Arena Simulation | <16.20.02 |
* Upgrade to 16.20.02 which has been patched to mitigate these issues, by referencing BF29820 - Patch: ZDI Security Patch & Windows 11 updates , Arena 16.2 https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141044 .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27854 is a vulnerability in Rockwell Automation Arena Simulation that allows an attacker to execute arbitrary code by exploiting a memory buffer overflow.
The severity of CVE-2023-27854 is rated as high, with a severity value of 7.8.
CVE-2023-27854 affects Rockwell Automation Arena Simulation up to version 16.20.02.
CVE-2023-27854 can be exploited by a threat actor using a memory buffer overflow to execute malicious code on the system.
To fix CVE-2023-27854, it is recommended to update Rockwell Automation Arena Simulation to a version that is not affected by the vulnerability.