An “out of bounds read” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to read beyond the boundaries of an allocated memory. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
Solution:
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html | vendor advisory |