cvelist/2024/21xxx/CVE-2024-21912.json

107 lines
3.5 KiB
JSON
Raw Normal View History

2024-01-03 17:00:37 +00:00
{
2024-04-02 14:16:49 +00:00
"data_version": "4.0",
2024-01-03 17:00:37 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-21912",
2024-04-02 14:16:49 +00:00
"ASSIGNER": "PSIRT@rockwellautomation.com",
"STATE": "PUBLIC"
2024-01-03 17:00:37 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-04-02 14:16:49 +00:00
"value": "\nAn arbitrary code execution vulnerability in Rockwell Automation Arena Simulation could let a malicious user insert unauthorized code into the software. This is done by writing beyond the designated memory area, which causes an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-787 Out-of-bounds Write",
"cweId": "CWE-787"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Rockwell Automation",
"product": {
"product_data": [
{
"product_name": "Arena Simulation",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Version 16.00 - 16.20.02"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.rockwellautomation.com/en-us/support/advisory.SD-1665.html",
"refsource": "MISC",
"name": "https://www.rockwellautomation.com/en-us/support/advisory.SD-1665.html"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to v16.20.03"
}
],
"value": "Update to v16.20.03"
}
],
"credits": [
{
"lang": "en",
"value": "Michael Heinzl"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
2024-01-03 17:00:37 +00:00
}
]
}
}