CVE-2024-11155

A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*

History

14 Apr 2025, 17:17

Type Values Removed Values Added
First Time Rockwellautomation
Rockwellautomation arena
CPE cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*
References () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html - () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html - Vendor Advisory
Summary
  • (es) Existe una vulnerabilidad de ejecución de código de “use after free” en Rockwell Automation Arena® que podría permitir que un actor de amenazas manipule un archivo DOE y obligue al software a utilizar un recurso que ya se utilizó. Si se explota, un actor de amenazas podría aprovechar esta vulnerabilidad para ejecutar código arbitrario. Para explotar esta vulnerabilidad, un usuario legítimo debe ejecutar el código malicioso manipulado por el actor de amenazas.

06 Dec 2024, 19:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

05 Dec 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-05 18:15

Updated : 2025-04-14 17:17


NVD link : CVE-2024-11155

Mitre link : CVE-2024-11155

CVE.ORG link : CVE-2024-11155


JSON object : View

Products Affected

rockwellautomation

  • arena
CWE
CWE-416

Use After Free