Rockwell Automation Arena < 16.20.09 Multiple Vulnerabilities

high Nessus Plugin ID 234500

Synopsis

An updater application installed on the remote Windows host is affected by a remote code execution vulnerability.

Description

The version of Rockwell Automation Arena installed on the remote Windows host is prior to 16.20.09. It is, therefore, affected by a multiple vulnerabilities

- A local code execution vulnerability exists in the affected products due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. (CVE-2025-2285, CVE-2025-2286, CVE-2025-2287)

- A local code execution vulnerability exists in the affected products due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. (CVE-2025-2288, CVE-2025-2829)

- A local code execution vulnerability exists in the affected products due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file. (CVE-2025-3285)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Rockwell Automation Arena 16.20.09 or later.

See Also

http://www.nessus.org/u?dedf139a

Plugin Details

Severity: High

ID: 234500

File Name: rockwell_arena_sd_1726.nasl

Version: 1.2

Type: local

Agent: windows

Family: Windows

Published: 4/16/2025

Updated: 4/17/2025

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-2285

CVSS v3

Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:rockwellautomation:arena

Required KB Items: SMB/Registry/Enumerated, installed_sw/Rockwell Arena

Patch Publication Date: 4/7/2025

Vulnerability Publication Date: 4/7/2025

Reference Information

CVE: CVE-2025-2285, CVE-2025-2286, CVE-2025-2287, CVE-2025-2288, CVE-2025-2293, CVE-2025-2829, CVE-2025-3285, CVE-2025-3286, CVE-2025-3287, CVE-2025-3288, CVE-2025-3289

IAVB: 2025-B-0057