ID

VAR-202403-2964


CVE

CVE-2024-21913


TITLE

Rockwell Automation  of  arena simulation  Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2024-014194

DESCRIPTION

A heap-based memory buffer overflow vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code into the software by overstepping the memory boundaries, which triggers an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor. Rockwell Automation of arena simulation Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Rockwell Automation Arena Simulation Software is a set of simulation software from Rockwell Automation of the United States that provides 3D animation and graphics functions

Trust: 2.16

sources: NVD: CVE-2024-21913 // JVNDB: JVNDB-2024-014194 // CNVD: CNVD-2024-18332

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-18332

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:arenascope:ltversion:16.20.03

Trust: 1.0

vendor:rockwellautomationmodel:arenascope:gteversion:16.00.00

Trust: 1.0

vendor:rockwell automationmodel:arena simulationscope:eqversion:16.00.00 that's all 16.20.03

Trust: 0.8

vendor:rockwell automationmodel:arena simulationscope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:arena simulationscope:eqversion: -

Trust: 0.8

vendor:rockwellmodel:automation arena simulation softwarescope:eqversion:16.00

Trust: 0.6

sources: CNVD: CNVD-2024-18332 // JVNDB: JVNDB-2024-014194 // NVD: CVE-2024-21913

CVSS

SEVERITY

CVSSV2

CVSSV3

PSIRT@rockwellautomation.com: CVE-2024-21913
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2024-21913
value: HIGH

Trust: 1.0

NVD: CVE-2024-21913
value: HIGH

Trust: 0.8

CNVD: CNVD-2024-18332
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-18332
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

PSIRT@rockwellautomation.com: CVE-2024-21913
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2024-21913
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-18332 // JVNDB: JVNDB-2024-014194 // NVD: CVE-2024-21913 // NVD: CVE-2024-21913

PROBLEMTYPE DATA

problemtype:CWE-122

Trust: 1.0

problemtype:CWE-787

Trust: 1.0

problemtype:Heap-based buffer overflow (CWE-122) [ others ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-014194 // NVD: CVE-2024-21913

PATCH

title:Patch for Rockwell Automation Arena Simulation Software Heap Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/543371

Trust: 0.6

sources: CNVD: CNVD-2024-18332

EXTERNAL IDS

db:NVDid:CVE-2024-21913

Trust: 3.2

db:ICS CERTid:ICSA-24-086-03

Trust: 0.8

db:JVNid:JVNVU95922371

Trust: 0.8

db:JVNDBid:JVNDB-2024-014194

Trust: 0.8

db:CNVDid:CNVD-2024-18332

Trust: 0.6

sources: CNVD: CNVD-2024-18332 // JVNDB: JVNDB-2024-014194 // NVD: CVE-2024-21913

REFERENCES

url:https://www.rockwellautomation.com/en-us/support/advisory.sd-1665.html

Trust: 1.6

url:https://jvn.jp/vu/jvnvu95922371/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-21913

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-086-03

Trust: 0.8

sources: CNVD: CNVD-2024-18332 // JVNDB: JVNDB-2024-014194 // NVD: CVE-2024-21913

SOURCES

db:CNVDid:CNVD-2024-18332
db:JVNDBid:JVNDB-2024-014194
db:NVDid:CVE-2024-21913

LAST UPDATE DATE

2024-12-17T22:36:09.423000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-18332date:2024-04-17T00:00:00
db:JVNDBid:JVNDB-2024-014194date:2024-12-10T00:45:00
db:NVDid:CVE-2024-21913date:2024-12-17T16:16:24.157

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-18332date:2024-04-17T00:00:00
db:JVNDBid:JVNDB-2024-014194date:2024-12-10T00:00:00
db:NVDid:CVE-2024-21913date:2024-03-26T16:15:10.670