First published: Tue Apr 08 2025(Updated: )
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation Arena |
Corrected in v.16.20.09 and later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2829 has a critical severity rating due to its potential for local code execution.
To fix CVE-2025-2829, update Rockwell Automation Arena to the latest patched version as recommended by the vendor.
CVE-2025-2829 affects users of Rockwell Automation Arena who utilize the vulnerable versions of the software.
Exploiting CVE-2025-2829 could allow a threat actor to execute arbitrary code and potentially disclose sensitive information.
CVE-2025-2829 is caused by improper validation of user-supplied data leading to writing outside of the allocated memory buffer.