We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3286

Local Code Execution Vulnerability in Arena®



Description

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Reserved 2025-04-04 | Published 2025-04-08 | Updated 2025-04-08 | Assigner Rockwell


HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-125 Out of Bounds Read

Product status

Default status
unaffected

16.20.08 and earlier
affected

References

www.rockwellautomation.com/...dvisories/advisory.SD1726.html

cve.org (CVE-2025-3286)

nvd.nist.gov (CVE-2025-3286)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3286

Support options

Helpdesk Chat, Email, Knowledgebase