First published: Thu Dec 05 2024(Updated: )
An “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable before it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation Arena | ||
Rockwell Automation | <=16.20.00 |
Corrected in software version 16.20.06 and later Mitigations and Workarounds Customers using the affected software are encouraged to apply these risk mitigations, if possible. For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight to minimize the risk of the vulnerability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11158 is classified as a code execution vulnerability, which can allow unauthorized access and potential control of the affected system.
To fix CVE-2024-11158, ensure you are running the latest version of Rockwell Automation Arena and apply any patches provided by the vendor.
CVE-2024-11158 affects the Rockwell Automation Arena software.
Exploiting CVE-2024-11158 allows attackers to execute arbitrary code by forcing the software to access an uninitialized variable.
CVE-2024-11158 was disclosed recently and details can be found in the related security advisories by Rockwell Automation.