First published: Thu Dec 19 2024(Updated: )
A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation Arena | ||
All of | ||
Rockwell Automation | <=16.20.07 | |
Microsoft Windows Operating System |
Mitigations and Workarounds Customers using the affected software are encouraged to apply these risk mitigations, if possible. * Do not load untrusted Arena® model files. * Hold the control key down when loading files to help prevent the VBA file stream from loading.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12672 has been rated as a critical severity vulnerability due to its potential to allow arbitrary code execution.
To remediate CVE-2024-12672, update Rockwell Automation Arena to the latest version provided by the vendor.
CVE-2024-12672 affects Rockwell Automation Arena software.
CVE-2024-12672 is a memory corruption vulnerability that allows memory writes beyond allocated boundaries.
Yes, if successfully exploited, CVE-2024-12672 could allow a threat actor to execute arbitrary code on the affected system.