Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

Rockwell Automation, Inc.

BOS ID

-
BOSS-VENDOR-78160

Tags

-
N/A

Related Bos

-
N/A

Note

-

https://www.rockwellautomation.com/en-in.html https://www.rockwellautomation.com/en-in/company/about-us/legal-notices.html

Mapped CVEsMapped VendorsRelated AssignersReports
351Vulnerabilities found

CVE-2025-7693
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-9.3||CRITICAL
EPSS-0.10% / 28.29%
||
7 Day CHG+0.02%
Published-18 Aug, 2025 | 17:53
Updated-18 Aug, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Micro800 Vulnerability

A security issue exists due to improper handling of malformed CIP Forward Close packets during fuzzing. The controller enters a solid red Fault LED state and becomes unresponsive. Upon power cycle, the controller will enter recoverable fault where the MS LED and Fault LED become flashing red and reports fault code 0xF015. To recover, clear the fault.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-PLC - Micro850 L50E
CWE ID-CWE-20
Improper Input Validation
CVE-2025-7971
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-7.3||HIGH
EPSS-0.03% / 7.20%
||
7 Day CHG~0.00%
Published-14 Aug, 2025 | 15:02
Updated-15 Aug, 2025 | 13:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Studio 5000 Logix Designer® – Arbitrary Code Execution Vulnerability

A security issues exists within Studio 5000 Logix Designer due to unsafe handling of environment variables. If the specified path lacks a valid file, Logix Designer crashes; However, it may be possible to execute malicious code without triggering a crash.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-Studio 5000 Logix Designer®
CWE ID-CWE-20
Improper Input Validation
CVE-2025-7972
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.4||HIGH
EPSS-0.02% / 2.96%
||
7 Day CHG~0.00%
Published-14 Aug, 2025 | 14:47
Updated-15 Aug, 2025 | 13:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FactoryTalk® Linx Network Browser Security Bypass Vulnerability

A security issue exists within the FactoryTalk Linx Network Browser. By modifying the process.env.NODE_ENV to ‘development’, the attacker can disable FTSP token validation. This bypass allows access to create, update, and delete FTLinx drivers.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FactoryTalk® Linx
CWE ID-CWE-286
Incorrect User Management
CVE-2025-9042
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.10% / 28.29%
||
7 Day CHG+0.02%
Published-14 Aug, 2025 | 14:23
Updated-15 Aug, 2025 | 13:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FLEX 5000 I/O - Module Fault

A security issue exists due to improper handling of CIP Class 32’s request when a module is inhibited on the 5094-IY8 device. It causes the module to enter a fault state with the Module LED flashing red. Upon un-inhibiting, the module returns a connection fault (Code 16#0010), and the module cannot recover without a power cycle.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FLEX 5000 I/O
CWE ID-CWE-1287
Improper Validation of Specified Type of Input
CVE-2025-9041
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.10% / 28.29%
||
7 Day CHG+0.02%
Published-14 Aug, 2025 | 14:17
Updated-15 Aug, 2025 | 13:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FLEX 5000 I/O - Module Fault

A security issue exists due to improper handling of CIP Class 32’s request when a module is inhibited on the 5094-IF8 device. It causes the module to enter a fault state with the Module LED flashing red. Upon un-inhibiting, the module returns a connection fault (Code 16#0010), and the module cannot recover without a power cycle.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FLEX 5000 I/O
CWE ID-CWE-1287
Improper Validation of Specified Type of Input
CVE-2025-7973
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.85%
||
7 Day CHG~0.00%
Published-14 Aug, 2025 | 13:52
Updated-15 Aug, 2025 | 13:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FactoryTalk® ViewPoint Privilege Escalation Vulnerability

A security issue exists in FactoryTalk ViewPoint version 14.0 or below due to improper handling of MSI repair operations. During a repair, attackers can hijack the cscript.exe console window, which runs with SYSTEM privileges. This can be exploited to spawn an elevated command prompt, enabling full privilege escalation.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FactoryTalk® ViewPoint
CWE ID-CWE-268
Privilege Chaining
CVE-2025-7773
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.8||HIGH
EPSS-0.05% / 16.55%
||
7 Day CHG+0.01%
Published-14 Aug, 2025 | 13:52
Updated-15 Aug, 2025 | 13:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation ArmorBlock 5000 I/O – Web Server Vulnerabilities

A security issue exists within the 5032 16pt Digital Configurable module’s web server. The web server’s session number increments at an interval that correlates to the last two consecutive sign in session interval, making it predictable.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-5032-CFGB16M12P5DR5032-CFGB16M12DR5032-CFGB16M12M12LDR
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-7774
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.8||HIGH
EPSS-0.05% / 16.55%
||
7 Day CHG+0.01%
Published-14 Aug, 2025 | 13:39
Updated-15 Aug, 2025 | 13:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation ArmorBlock 5000 I/O – Web Server Vulnerabilities

A security issue exists within the 5032 16pt Digital Configurable module’s web server. Intercepted session credentials can be used within a 3-minute timeout window, allowing unauthorized users to perform privileged actions.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-5032-CFGB16M12P5DR5032-CFGB16M12DR5032-CFGB16M12M12LDR
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-9036
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.12%
||
7 Day CHG+0.01%
Published-14 Aug, 2025 | 13:39
Updated-15 Aug, 2025 | 13:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FactoryTalk® Action Manager v1.0.0 Runtime Vulnerability

A security issue in the runtime event system allows unauthenticated connections to receive a reusable API token. This token is broadcasted over a WebSocket and can be intercepted by any local client listening on the connection.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FactoryTalk® Action Manager
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-7353
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-9.3||CRITICAL
EPSS-0.34% / 56.28%
||
7 Day CHG+0.08%
Published-14 Aug, 2025 | 13:23
Updated-15 Aug, 2025 | 13:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation ControlLogix® Ethernet Remote Code Execution Vulnerability

A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-1756-EN2F/C1756-EN2TR/C1756-EN3TR/B1756-EN2T/D1756-EN2TP/A
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2025-7033
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.4||HIGH
EPSS-0.03% / 4.92%
||
7 Day CHG~0.00%
Published-05 Aug, 2025 | 13:42
Updated-13 Aug, 2025 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Heap-based Buffer Overflow In Arena® Simulation

A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena® Simulation
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2025-7032
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.4||HIGH
EPSS-0.03% / 4.92%
||
7 Day CHG~0.00%
Published-05 Aug, 2025 | 13:39
Updated-13 Aug, 2025 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Stack-based Buffer Overflow In Arena® Simulation

A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena® Simulation
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-7025
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.4||HIGH
EPSS-0.03% / 4.92%
||
7 Day CHG~0.00%
Published-05 Aug, 2025 | 13:37
Updated-13 Aug, 2025 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Heap-based Buffer Overflow In Arena® Simulation

A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena® Simulation
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2025-6376
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-7.1||HIGH
EPSS-0.01% / 1.31%
||
7 Day CHG~0.00%
Published-09 Jul, 2025 | 20:13
Updated-11 Jul, 2025 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arena® Simulation Out-Of-Bounds Write Remote Code Execution Vulnerability

A remote code execution security issue exists in the Rockwell Automation Arena®.  A crafted DOE file can force Arena Simulation to write beyond the boundaries of an allocated object. Exploitation requires user interaction, such as opening a malicious file within the software. If exploited, a threat actor could execute arbitrary code on the target system. The software must run under the context of the administrator in order to cause worse case impact. This is reflected in the Rockwell CVSS score, as AT:P.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-6377
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-7.1||HIGH
EPSS-0.01% / 1.31%
||
7 Day CHG~0.00%
Published-09 Jul, 2025 | 20:12
Updated-11 Jul, 2025 | 18:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arena® Simulation Out-Of-Bounds Write Remote Code Execution Vulnerability

A remote code execution security issue exists in the Rockwell Automation Arena®.  A crafted DOE file can force Arena Simulation to write beyond the boundaries of an allocated object. Exploitation requires user interaction, such as opening a malicious file within the software. If exploited, a threat actor could execute arbitrary code on the target system. The software must run under the context of the administrator in order to cause worse case impact. This is reflected in the Rockwell CVSS score, as AT:P.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-3618
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.01% / 0.66%
||
7 Day CHG~0.00%
Published-15 Apr, 2025 | 17:19
Updated-14 Jul, 2025 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege Escalation Vulnerability

A denial-of-service vulnerability exists in the Rockwell Automation ThinManager. The software fails to adequately verify the outcome of memory allocation while processing Type 18 messages. If exploited, a threat actor could cause a denial-of-service on the target software.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-thinmanagerThinManager
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2025-3617
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.00% / 0.16%
||
7 Day CHG~0.00%
Published-15 Apr, 2025 | 17:17
Updated-14 Jul, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege Escalation in ThinManager®

A privilege escalation vulnerability exists in the Rockwell Automation ThinManager. When the software starts up, files are deleted in the temporary folder causing the Access Control Entry of the directory to inherit permissions from the parent directory. If exploited, a threat actor could inherit elevated privileges.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-thinmanagerThinManager®
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-3289
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 15:34
Updated-14 Jul, 2025 | 18:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Code Execution Vulnerability in Arena®

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-3288
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 15:30
Updated-14 Jul, 2025 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Code Execution Vulnerability in Arena®

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-3287
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 15:29
Updated-14 Jul, 2025 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Code Execution Vulnerability in Arena®

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-3286
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 15:28
Updated-14 Jul, 2025 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Code Execution Vulnerability in Arena®

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-3285
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 15:26
Updated-14 Jul, 2025 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Code Execution Vulnerability in Arena®

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-2829
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 15:24
Updated-14 Jul, 2025 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Code Execution Vulnerability in Arena®

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-2293
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 15:20
Updated-14 Jul, 2025 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Code Execution Vulnerability in Arena®

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-2288
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 15:19
Updated-14 Jul, 2025 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Code Execution Vulnerability in Arena®

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-2287
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 15:16
Updated-14 Jul, 2025 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Code Execution Vulnerability in Arena®

A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-457
Use of Uninitialized Variable
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2025-2286
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 15:16
Updated-14 Jul, 2025 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Code Execution Vulnerability in Arena®

A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-457
Use of Uninitialized Variable
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2025-2285
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.73%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 15:15
Updated-14 Jul, 2025 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Code Execution Vulnerability in Arena®

A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-457
Use of Uninitialized Variable
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2025-1449
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.38%
||
7 Day CHG-0.03%
Published-31 Mar, 2025 | 16:00
Updated-01 Apr, 2025 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Admin Shell Access Vulnerability in Rockwell Automation Verve Asset Manager

A vulnerability exists in the Rockwell Automation Verve Asset Manager due to insufficient variable sanitizing. A portion of the administrative web interface for Verve's Legacy Agentless Device Inventory (ADI) capability (deprecated since the 1.36 release) allows users to change a variable with inadequate sanitizing. If exploited, it could allow a threat actor with administrative access to run arbitrary commands in the context of the container running the service.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-Verve Asset Manager
CVE-2025-0477
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-9.3||CRITICAL
EPSS-0.05% / 16.25%
||
7 Day CHG~0.00%
Published-30 Jan, 2025 | 17:49
Updated-12 Feb, 2025 | 19:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FactoryTalk® AssetCentre Data Exposure Vulnerability

An encryption vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to a weak encryption methodology and could allow a threat actor to extract passwords belonging to other users of the application.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FactoryTalk® AssetCentre
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2025-0497
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-7.3||HIGH
EPSS-0.02% / 2.70%
||
7 Day CHG~0.00%
Published-30 Jan, 2025 | 17:40
Updated-12 Feb, 2025 | 19:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FactoryTalk® AssetCentre Data Exposure Vulnerability

A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to storing credentials in the configuration file of EventLogAttachmentExtractor, ArchiveExtractor, LogCleanUp, or ArchiveLogCleanUp packages.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FactoryTalk® AssetCentre
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2025-0498
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-7||HIGH
EPSS-0.02% / 4.37%
||
7 Day CHG~0.00%
Published-30 Jan, 2025 | 17:36
Updated-12 Feb, 2025 | 19:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation FactoryTalk® AssetCentre Data Exposure Vulnerability

A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to insecure storage of FactoryTalk® Security user tokens, which could allow a threat actor to steal a token and, impersonate another user.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FactoryTalk® AssetCentre
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2025-24482
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-7||HIGH
EPSS-0.05% / 14.76%
||
7 Day CHG~0.00%
Published-28 Jan, 2025 | 20:59
Updated-28 Jan, 2025 | 21:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FactoryTalk® View Site Edition - Local Code Injection

A Local Code Injection Vulnerability exists in the product and version listed above. The vulnerability is due to incorrect default permissions and allows for DLLs to be executed with higher level permissions.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FactoryTalk® View Site Edition
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-24481
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-7||HIGH
EPSS-0.02% / 4.41%
||
7 Day CHG~0.00%
Published-28 Jan, 2025 | 20:55
Updated-12 Feb, 2025 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FactoryTalk® View Site Edition - Incorrect Permission Assignment

An Incorrect Permission Assignment Vulnerability exists in the product and version listed above. The vulnerability is due to incorrect permissions being assigned to the remote debugger port and can allow for unauthenticated access to the system configuration.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FactoryTalk® View Site Edition
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2025-24480
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-9.3||CRITICAL
EPSS-0.56% / 67.08%
||
7 Day CHG+0.12%
Published-28 Jan, 2025 | 19:01
Updated-05 Feb, 2025 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FactoryTalk® View Machine Editon - Remote Code Execution

A Remote Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to lack of input sanitation and could allow a remote attacker to run commands or code as a high privileged user.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FactoryTalk® View Machine Edition
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-24479
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.6||HIGH
EPSS-0.03% / 5.21%
||
7 Day CHG~0.00%
Published-28 Jan, 2025 | 18:52
Updated-12 Feb, 2025 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FactoryTalk® View Machine Edition - Local Code Injection

A Local Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to a default setting in Windows and allows access to the Command Prompt as a higher privileged user.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-FactoryTalk View Machine Edition
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-24478
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-7.1||HIGH
EPSS-0.09% / 26.29%
||
7 Day CHG+0.01%
Published-28 Jan, 2025 | 18:41
Updated-06 Feb, 2025 | 21:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
5380/5580 Denial-of-Service Vulnerability

A denial-of-service vulnerability exists in the affected products. The vulnerability could allow a remote, non-privileged user to send malicious requests resulting in a major nonrecoverable fault causing a denial-of-service.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-GuardLogix 5580 SIL 3Compact GuardLogix 5380 SIL 3
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2025-0631
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.7||HIGH
EPSS-0.04% / 12.93%
||
7 Day CHG~0.00%
Published-28 Jan, 2025 | 18:27
Updated-06 Feb, 2025 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PowerFlex® 755 Credential Exposure Vulnerability

A Credential Exposure Vulnerability exists in the above-mentioned product and version. The vulnerability is due to using HTTP resulting in credentials being sent in clear text.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-PowerFlex 755
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-0659
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-7||HIGH
EPSS-0.07% / 23.16%
||
7 Day CHG+0.01%
Published-28 Jan, 2025 | 15:16
Updated-28 Jan, 2025 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path Traversal and Rockwell Automation Third-party Vulnerability in DataMosaix™ Private Cloud

A path traversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Private Cloud. By specifying the character sequence in the body of the vulnerable endpoint, it is possible to overwrite files outside of the intended directory. A threat actor with admin privileges could leverage this vulnerability to overwrite reports including user projects.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-DataEdgePlatform DataMosaix™ Private Cloud
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-11364
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.44%
||
7 Day CHG~0.00%
Published-19 Dec, 2024 | 21:04
Updated-11 Jul, 2025 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Third Party Vulnerability in Arena®

Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Action-Not Available
Vendor-Microsoft CorporationRockwell Automation, Inc.
Product-arenawindowsArena®
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2024-12672
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.24%
||
7 Day CHG~0.00%
Published-19 Dec, 2024 | 20:58
Updated-03 Apr, 2025 | 16:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Third Party Vulnerability in Arena®

A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Action-Not Available
Vendor-Microsoft CorporationRockwell Automation, Inc.
Product-arenawindowsArena®
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-12175
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.59%
||
7 Day CHG~0.00%
Published-19 Dec, 2024 | 20:53
Updated-13 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Code Execution Vulnerability in Arena

Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-416
Use After Free
CVE-2024-11157
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.24%
||
7 Day CHG~0.00%
Published-19 Dec, 2024 | 20:48
Updated-13 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Third Party Vulnerability in Arena

A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-12373
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-9.3||CRITICAL
EPSS-0.11% / 30.28%
||
7 Day CHG+0.01%
Published-18 Dec, 2024 | 15:38
Updated-18 Dec, 2024 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation PowerMonitor™ 1000 Denial of Service

A denial-of-service vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in a buffer-overflow, potentially causing denial-of-service.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-PM1k 1408-EM2A-485PM1k 1408-EM3A-ENTPM1k 1408-EM2A-ENTPM1k 1408-BC3A-ENTPM1k 1408-TS3A-485PM1k 1408-EM1A-ENTPM1k 1408-BC3A-485PM1k 1408-TR2A-ENTPM1k 1408-TR2A-485PM1k 1408-TR1A-ENTPM1k 1408-TS3A-ENTPM1k 1408-EM3A-485PM1k 1408-EM1A-485PM1k 1408-TR1A-485
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-12372
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-9.3||CRITICAL
EPSS-1.09% / 77.06%
||
7 Day CHG+0.09%
Published-18 Dec, 2024 | 15:28
Updated-18 Dec, 2024 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation PowerMonitor™ 1000 Denial of Service

A denial-of-service and possible remote code execution vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in corruption of the heap memory which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-PM1k 1408-EM2A-485PM1k 1408-EM3A-ENTPM1k 1408-EM2A-ENTPM1k 1408-BC3A-ENTPM1k 1408-TS3A-485PM1k 1408-EM1A-ENTPM1k 1408-BC3A-485PM1k 1408-TR2A-ENTPM1k 1408-TR2A-485PM1k 1408-TR1A-ENTPM1k 1408-TS3A-ENTPM1k 1408-EM3A-485PM1k 1408-EM1A-485PM1k 1408-TR1A-485
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-12371
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-9.3||CRITICAL
EPSS-0.10% / 29.14%
||
7 Day CHG+0.01%
Published-18 Dec, 2024 | 15:23
Updated-18 Dec, 2024 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation PowerMonitor™ 1000 Remote Code Execution

A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-PM1k 1408-EM2A-485PM1k 1408-EM3A-ENTPM1k 1408-EM2A-ENTPM1k 1408-BC3A-ENTPM1k 1408-TS3A-485PM1k 1408-EM1A-ENTPM1k 1408-BC3A-485PM1k 1408-TR2A-ENTPM1k 1408-TR2A-485PM1k 1408-TR1A-ENTPM1k 1408-TS3A-ENTPM1k 1408-EM3A-485PM1k 1408-EM1A-485PM1k 1408-TR1A-485
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-12130
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 2.67%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 17:47
Updated-17 Dec, 2024 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Arena® Out of Bounds Read Vulnerability

An “out of bounds read” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to read beyond the boundaries of an allocated memory. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-11158
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.12%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 17:41
Updated-18 Apr, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Arena® Uninitialized Vulnerability

An “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable before it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®arena
CWE ID-CWE-665
Improper Initialization
CVE-2024-11156
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.02% / 2.67%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 17:37
Updated-17 Dec, 2024 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Arena® Out of Bounds Write Vulnerability

An “out of bounds write” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®arena
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-11155
Assigner-Rockwell Automation
ShareView Details
Assigner-Rockwell Automation
CVSS Score-8.5||HIGH
EPSS-0.03% / 5.40%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 17:32
Updated-14 Apr, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rockwell Automation Arena® Use After Free Vulnerability

A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-arenaArena®arena
CWE ID-CWE-416
Use After Free
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 7
  • 8
  • Next