
Cloud Vulnerability DB
A community-led vulnerabilities database
An uninitialized variable code execution vulnerability exists in the Rockwell Automation Arena® software, identified as CVE-2024-11158. The vulnerability affects Arena versions 16.20.00 and prior, allowing threat actors to craft malicious DOE files that force the software to access variables before initialization (Rockwell Advisory, CISA Advisory).
The vulnerability is classified as an improper initialization issue (CWE-665) that occurs during the parsing of DOE files. It has received a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and a CVSS v4.0 score of 8.5 (AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). The vulnerability requires local access and user interaction to be exploited (ZDI Advisory, CISA Advisory).
If successfully exploited, this vulnerability allows threat actors to execute arbitrary code in the context of the current process. The impact could be significant, affecting system confidentiality, integrity, and availability, particularly in critical manufacturing environments (CISA Advisory, Rockwell Advisory).
Rockwell Automation has released version 16.20.06 and later to address this vulnerability. Additionally, users are advised to implement workarounds such as not loading untrusted Arena model files and holding the control key down when loading files to prevent VBA file stream loading. Organizations should also implement security best practices for industrial automation control systems (Rockwell Advisory, CISA Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."