A memory buffer vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by corrupting the memory and triggering an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.
References
Link | Resource |
---|---|
https://www.rockwellautomation.com/en-us/support/advisory.SD-1665.html | Broken Link |
https://www.rockwellautomation.com/en-us/support/advisory.SD-1665.html | Broken Link |
Configurations
History
09 Dec 2024, 15:18
Type | Values Removed | Values Added |
---|---|---|
First Time |
Rockwellautomation
Rockwellautomation arena Simulation |
|
CPE | cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:* | |
References | () https://www.rockwellautomation.com/en-us/support/advisory.SD-1665.html - Broken Link |
21 Nov 2024, 08:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.rockwellautomation.com/en-us/support/advisory.SD-1665.html - | |
Summary |
|
26 Mar 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-26 16:15
Updated : 2024-12-09 15:18
NVD link : CVE-2024-21918
Mitre link : CVE-2024-21918
CVE.ORG link : CVE-2024-21918
JSON object : View
Products Affected
rockwellautomation
- arena_simulation
CWE
CWE-416
Use After Free