ID

VAR-202412-2528


CVE

CVE-2024-12175


TITLE

Rockwell Automation  of  Arena  Vulnerability in using free memory in

Trust: 0.8

sources: JVNDB: JVNDB-2024-016255

DESCRIPTION

Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor. (DoS) It may be in a state. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Rockwell Automation Arena Simulation is a set of simulation software from Rockwell Automation, an American company, that provides 3D animation and graphics functions

Trust: 2.79

sources: NVD: CVE-2024-12175 // JVNDB: JVNDB-2024-016255 // ZDI: ZDI-24-1714 // CNVD: CNVD-2025-00881

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-00881

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:arenascope:ltversion:16.20.07

Trust: 1.0

vendor:rockwell automationmodel:arenascope:eqversion: -

Trust: 0.8

vendor:rockwell automationmodel:arenascope:eqversion:16.20.07

Trust: 0.8

vendor:rockwell automationmodel:arenascope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:arena simulationscope: - version: -

Trust: 0.7

vendor:rockwellmodel:automation arena simulationscope: - version: -

Trust: 0.6

sources: ZDI: ZDI-24-1714 // CNVD: CNVD-2025-00881 // JVNDB: JVNDB-2024-016255 // NVD: CVE-2024-12175

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2024-12175
value: HIGH

Trust: 1.0

PSIRT@rockwellautomation.com: CVE-2024-12175
value: HIGH

Trust: 1.0

NVD: CVE-2024-12175
value: HIGH

Trust: 0.8

ZDI: CVE-2024-12175
value: HIGH

Trust: 0.7

CNVD: CNVD-2025-00881
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-00881
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2024-12175
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2024-12175
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2024-12175
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-24-1714 // CNVD: CNVD-2025-00881 // JVNDB: JVNDB-2024-016255 // NVD: CVE-2024-12175 // NVD: CVE-2024-12175

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.0

problemtype:Use of freed memory (CWE-416) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-016255 // NVD: CVE-2024-12175

PATCH

title:Rockwell Automation has issued an update to correct this vulnerability.url:https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html

Trust: 0.7

title:Patch for Rockwell Automation Arena Simulation DOE File Memory Misreference Code Execution Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/650131

Trust: 0.6

sources: ZDI: ZDI-24-1714 // CNVD: CNVD-2025-00881

EXTERNAL IDS

db:NVDid:CVE-2024-12175

Trust: 3.9

db:ZDIid:ZDI-24-1714

Trust: 1.3

db:JVNid:JVNVU91729891

Trust: 0.8

db:ICS CERTid:ICSA-24-345-06

Trust: 0.8

db:JVNDBid:JVNDB-2024-016255

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-24158

Trust: 0.7

db:CNVDid:CNVD-2025-00881

Trust: 0.6

sources: ZDI: ZDI-24-1714 // CNVD: CNVD-2025-00881 // JVNDB: JVNDB-2024-016255 // NVD: CVE-2024-12175

REFERENCES

url:https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.sd1713.html

Trust: 2.5

url:https://jvn.jp/vu/jvnvu91729891/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-12175

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-345-06

Trust: 0.8

url:https://www.zerodayinitiative.com/advisories/zdi-24-1714/

Trust: 0.6

sources: ZDI: ZDI-24-1714 // CNVD: CNVD-2025-00881 // JVNDB: JVNDB-2024-016255 // NVD: CVE-2024-12175

CREDITS

Rocco Calvi (@TecR0c) with TecSecurity

Trust: 0.7

sources: ZDI: ZDI-24-1714

SOURCES

db:ZDIid:ZDI-24-1714
db:CNVDid:CNVD-2025-00881
db:JVNDBid:JVNDB-2024-016255
db:NVDid:CVE-2024-12175

LAST UPDATE DATE

2025-01-18T23:08:16.571000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-24-1714date:2024-12-19T00:00:00
db:CNVDid:CNVD-2025-00881date:2025-01-10T00:00:00
db:JVNDBid:JVNDB-2024-016255date:2025-01-16T01:40:00
db:NVDid:CVE-2024-12175date:2025-01-10T21:26:56.183

SOURCES RELEASE DATE

db:ZDIid:ZDI-24-1714date:2024-12-19T00:00:00
db:CNVDid:CNVD-2025-00881date:2025-01-10T00:00:00
db:JVNDBid:JVNDB-2024-016255date:2025-01-14T00:00:00
db:NVDid:CVE-2024-12175date:2024-12-19T21:15:07.530