First published: Fri Oct 27 2023(Updated: )
Rockwell Automation Arena Simulation contains an arbitrary code execution vulnerability that could potentially allow a malicious user to commit unauthorized code to the software by using an uninitialized pointer in the application. The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. The user would need to open a malicious file provided to them by the attacker for the code to execute.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Arena Simulation | <16.20.02 |
* Upgrade to 16.20.02 which has been patched to mitigate these issues, by referencing BF29820 - Patch: ZDI Security Patch & Windows 11 updates , Arena 16.2 https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141044 .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27858 is an uninitialized pointer vulnerability found in Rockwell Automation Arena Simulation software.
CVE-2023-27858 has a severity score of 7.8 (high).
CVE-2023-27858 allows a malicious user to execute arbitrary code in Rockwell Automation Arena Simulation through an uninitialized pointer.
To fix CVE-2023-27858, it is recommended to install the latest version of Rockwell Automation Arena Simulation software.
More information about CVE-2023-27858 can be found at the Rockwell Automation support page: [link](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141145).