CVE-2024-11155

A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*

History

14 Apr 2025, 17:17

Type Values Removed Values Added
CPE cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*
First Time Rockwellautomation
Rockwellautomation arena
References () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html - () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html - Vendor Advisory

06 Dec 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-05 18:15

Updated : 2025-04-14 17:17


NVD link : CVE-2024-11155

Mitre link : CVE-2024-11155

CVE.ORG link : CVE-2024-11155


JSON object : View

Products Affected

rockwellautomation

  • arena
CWE
CWE-416

Use After Free