CVE-2024-12175

Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*

History

10 Jan 2025, 21:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html - () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html - Vendor Advisory
CPE cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*
First Time Rockwellautomation
Rockwellautomation arena
CWE CWE-416

19 Dec 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-19 21:15

Updated : 2025-01-10 21:26


NVD link : CVE-2024-12175

Mitre link : CVE-2024-12175

CVE.ORG link : CVE-2024-12175


JSON object : View

Products Affected

rockwellautomation

  • arena
CWE
CWE-416

Use After Free