ID

VAR-202403-1239


CVE

CVE-2024-21912


TITLE

Rockwell Automation  of  arena simulation  Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2024-014202

DESCRIPTION

An arbitrary code execution vulnerability in Rockwell Automation Arena Simulation could let a malicious user insert unauthorized code into the software. This is done by writing beyond the designated memory area, which causes an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor. Rockwell Automation of arena simulation Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 2.16

sources: NVD: CVE-2024-21912 // JVNDB: JVNDB-2024-014202 // CNVD: CNVD-2024-15539

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-15539

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:arenascope:ltversion:16.20.03

Trust: 1.0

vendor:rockwellautomationmodel:arenascope:gteversion:16.00.00

Trust: 1.0

vendor:rockwell automationmodel:arena simulationscope:eqversion:16.00.00 that's all 16.20.03

Trust: 0.8

vendor:rockwell automationmodel:arena simulationscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:arena simulationscope:eqversion: -

Trust: 0.8

vendor:rockwellmodel:automation arena simulation softwarescope:eqversion:16.00

Trust: 0.6

sources: CNVD: CNVD-2024-15539 // JVNDB: JVNDB-2024-014202 // NVD: CVE-2024-21912

CVSS

SEVERITY

CVSSV2

CVSSV3

PSIRT@rockwellautomation.com: CVE-2024-21912
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2024-21912
value: HIGH

Trust: 1.0

NVD: CVE-2024-21912
value: HIGH

Trust: 0.8

CNVD: CNVD-2024-15539
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-15539
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

PSIRT@rockwellautomation.com: CVE-2024-21912
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2024-21912
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-15539 // JVNDB: JVNDB-2024-014202 // NVD: CVE-2024-21912 // NVD: CVE-2024-21912

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [ others ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-014202 // NVD: CVE-2024-21912

PATCH

title:Patch for Rockwell Automation Arena Simulation Software Arbitrary Code Execution Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/537521

Trust: 0.6

sources: CNVD: CNVD-2024-15539

EXTERNAL IDS

db:NVDid:CVE-2024-21912

Trust: 3.2

db:ICS CERTid:ICSA-24-086-03

Trust: 0.8

db:JVNid:JVNVU95922371

Trust: 0.8

db:JVNDBid:JVNDB-2024-014202

Trust: 0.8

db:CNVDid:CNVD-2024-15539

Trust: 0.6

sources: CNVD: CNVD-2024-15539 // JVNDB: JVNDB-2024-014202 // NVD: CVE-2024-21912

REFERENCES

url:https://www.rockwellautomation.com/en-us/support/advisory.sd-1665.html

Trust: 1.6

url:https://jvn.jp/vu/jvnvu95922371/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-21912

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-086-03

Trust: 0.8

sources: CNVD: CNVD-2024-15539 // JVNDB: JVNDB-2024-014202 // NVD: CVE-2024-21912

SOURCES

db:CNVDid:CNVD-2024-15539
db:JVNDBid:JVNDB-2024-014202
db:NVDid:CVE-2024-21912

LAST UPDATE DATE

2024-12-17T22:36:09.347000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-15539date:2024-03-29T00:00:00
db:JVNDBid:JVNDB-2024-014202date:2024-12-10T01:29:00
db:NVDid:CVE-2024-21912date:2024-12-17T16:16:07.373

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-15539date:2024-03-29T00:00:00
db:JVNDBid:JVNDB-2024-014202date:2024-12-10T00:00:00
db:NVDid:CVE-2024-21912date:2024-03-26T16:15:10.440