A remote
code execution security issue exists in the Rockwell Automation Arena®. A crafted DOE
file can force Arena Simulation to write beyond the boundaries of an allocated
object. Exploitation
requires user interaction, such as opening a malicious file within the software.
If exploited, a threat actor could execute arbitrary code on the target system.
The software must run under the context of the administrator in order to cause
worse case impact. This is reflected in the Rockwell CVSS score, as AT:P.
References
Link | Resource |
---|---|
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1729.html | Vendor Advisory |
Configurations
History
11 Jul 2025, 18:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-09 21:15
Updated : 2025-07-11 18:35
NVD link : CVE-2025-6376
Mitre link : CVE-2025-6376
CVE.ORG link : CVE-2025-6376
JSON object : View
Products Affected
rockwellautomation
- arena