Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-79vg-7ghj-4whj

Опубликовано: 19 дек. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 8.5
CVSS3: 7.8

Описание

Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

EPSS

Процентиль: 22%
0.00071
Низкий

8.5 High

CVSS4

7.8 High

CVSS3

Дефекты

CWE-416

Связанные уязвимости

CVSS3: 7.8
nvd
около 1 года назад

Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

CVSS3: 7.8
fstec
больше 1 года назад

Уязвимость программного обеспечения для дискретного моделирования событий и автоматизации Rockwell Automation Arena, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 22%
0.00071
Низкий

8.5 High

CVSS4

7.8 High

CVSS3

Дефекты

CWE-416