An “out of bounds write” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Solution:
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html | vendor advisory |