"value":"An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow potentially\u00a0resulting in a complete loss of confidentiality, integrity, and availability.\n"
"value":"\n\n<span style=\"background-color: rgb(255, 255, 255);\">Customers using the affected software are encouraged to apply the risk mitigations, if possible. <br></span><span style=\"background-color: var(--wht);\">- Upgrade to </span><u>16.20.01</u><span style=\"background-color: var(--wht);\"> which has been patched to mitigate this issue.</span>"
}
],
"value":"\nCustomers using the affected software are encouraged to apply the risk mitigations, if possible.\u00a0\u00a0\n- Upgrade to 16.20.01\u00a0which has been patched to mitigate this issue."
}
],
"credits":[
{
"lang":"en",
"value":"This vulnerability was reported to Rockwell Automation by Simon Janz working with Trend Micro's Zero Day Initiative."