CVE-2023-27858
low-risk
Published 2023-10-27
Rockwell Automation Arena Simulation contains an arbitrary code execution vulnerability that could potentially allow a malicious user to commit unauthorized code to the software by using an uninitialized pointer in the application. The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. The user would need to open a malicious file provided to them by the attacker for the code to execute.
Do I need to act?
-
0.07% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (1)
Affected Vendors
References (2)
Permissions Required
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141145
Permissions Required
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141145
29
/ 100
low-risk
Severity
24/34 · High
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal