First published: Tue Apr 08 2025(Updated: )
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation Arena |
Corrected in v.16.20.09 and later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3287 is classified as a high-severity vulnerability due to its potential for local code execution.
To fix CVE-2025-3287, you should apply the latest security patches provided by Rockwell Automation for Arena.
Any user of Rockwell Automation Arena that has not implemented the necessary security updates is vulnerable to CVE-2025-3287.
An attacker exploiting CVE-2025-3287 can execute arbitrary code and potentially disclose sensitive information on the affected system.
CVE-2025-3287 exploits the system through a stack-based memory buffer overflow resulting from improper validation of user input.