CVE-2025-6377
BaseFortify
Publication date: 2025-07-09
Last updated on: 2025-07-11
Assigner: Rockwell Automation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rockwellautomation | arena | to 16.20.09 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a remote code execution issue in Rockwell Automation Arena software. It occurs when a specially crafted DOE file causes the software to write beyond the boundaries of an allocated object. Exploiting this requires user interaction, such as opening a malicious file within the software. If exploited, an attacker could execute arbitrary code on the target system, potentially gaining control.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow a threat actor to execute arbitrary code on your system, potentially leading to unauthorized control or damage. The worst-case impact occurs if the software runs with administrator privileges, which could allow the attacker to perform high-level actions on the system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid opening untrusted or suspicious DOE files in Rockwell Automation Arena software. Ensure that the software is not run with administrator privileges unless necessary, as exploitation requires administrator context for worst-case impact. Apply any available patches or updates from Rockwell Automation once released.