First published: Thu Dec 05 2024(Updated: )
An “out of bounds write” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation | <=16.20.03 |
Corrected in software version 16.20.06 and later Mitigations and Workarounds Customers using the affected software are encouraged to apply these risk mitigations, if possible. For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight to minimize the risk of the vulnerability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11156 is considered a critical vulnerability due to its potential for arbitrary code execution.
To address CVE-2024-11156, users should update Rockwell Automation Arena to version 16.20.04 or later.
CVE-2024-11156 is an out of bounds write vulnerability.
CVE-2024-11156 affects Rockwell Automation Arena versions up to and including 16.20.03.
CVE-2024-11156 can be exploited by a threat actor to execute arbitrary code through a specially crafted DOE file.