CVE-2024-12175

Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*

History

10 Jan 2025, 21:26

Type Values Removed Values Added
CWE CWE-416
Summary
  • (es) Existe otra vulnerabilidad de ejecución de código de “use after free” en Rockwell Automation Arena® que podría permitir que un actor de amenazas manipular un archivo DOE y obligue al software a utilizar un recurso que ya se utilizó. Si se explota, un actor de amenazas podría aprovechar esta vulnerabilidad para ejecutar código arbitrario. Para explotar esta vulnerabilidad, un usuario legítimo debe ejecutar el código malicioso manipulado por el actor de amenazas.
First Time Rockwellautomation arena
Rockwellautomation
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html - () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html - Vendor Advisory
CPE cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*

19 Dec 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-19 21:15

Updated : 2025-03-13 17:15


NVD link : CVE-2024-12175

Mitre link : CVE-2024-12175

CVE.ORG link : CVE-2024-12175


JSON object : View

Products Affected

rockwellautomation

  • arena
CWE
CWE-416

Use After Free