First published: Thu Dec 05 2024(Updated: )
A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation Arena | ||
Rockwell Automation | <16.20.06 |
Corrected in software version 16.20.06 and later Mitigations and Workarounds Customers using the affected software are encouraged to apply these risk mitigations, if possible. For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight to minimize the risk of the vulnerability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11155 is classified as a critical 'use after free' code execution vulnerability.
To mitigate CVE-2024-11155, users should apply the latest security updates provided by Rockwell Automation for Arena software.
All versions of Rockwell Automation Arena are potentially affected by CVE-2024-11155 if they allow the execution of crafted DOE files.
CVE-2024-11155 can be exploited by crafting a malicious DOE file that forces Arena to use a resource that has already been freed.
Currently, the best approach for CVE-2024-11155 is to update to a patched version of Arena as no specific workaround is provided.