Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html | Vendor Advisory | 
Configurations
                    History
                    10 Jan 2025, 21:26
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 7.8  | 
| CWE | CWE-416 | |
| First Time | 
        
        Rockwellautomation
         Rockwellautomation arena  | 
|
| References | () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html - Vendor Advisory | |
| CPE | cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:* | |
| Summary | 
        
        
  | 
19 Dec 2024, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-12-19 21:15
Updated : 2025-03-13 17:15
NVD link : CVE-2024-12175
Mitre link : CVE-2024-12175
CVE.ORG link : CVE-2024-12175
JSON object : View
Products Affected
                rockwellautomation
- arena
 
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
