Rockwell Automation Arena Simulation Software (Update B)
Arena Simulation Software versions 16.00.00 and earlier contain multiple memory corruption and unsafe type casting vulnerabilities (CWE-416, CWE-843, CWE-824) that can be triggered by opening specially crafted .doe model files. Successful exploitation allows an attacker to cause the application to crash (denial of service) or execute arbitrary code on the affected workstation. The vulnerabilities are not remotely exploitable and require user interaction to open a malicious file. No known public exploits currently exist.
- User must open a malicious .doe file in Arena Simulation Software
- User must have Arena version 16.00.00 or earlier installed
- Arena application must be running on the workstation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0f662b85-ef07-4659-803c-442b63963c73Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.