Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-52mp-7hrc-jmxc

Опубликовано: 19 дек. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 8.5
CVSS3: 7.3

Описание

Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

EPSS

Процентиль: 8%
0.00031
Низкий

8.5 High

CVSS4

7.3 High

CVSS3

Дефекты

CWE-908

Связанные уязвимости

CVSS3: 7.3
nvd
около 1 года назад

Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

CVSS3: 7.8
fstec
больше 1 года назад

Уязвимость программного обеспечения для дискретного моделирования событий и автоматизации Rockwell Automation Arena, связанная с зависимостью от стороннего компонента, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 8%
0.00031
Низкий

8.5 High

CVSS4

7.3 High

CVSS3

Дефекты

CWE-908