Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-27854
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Rockwell Automation Arena® Simulation Out of Bounds Read Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow.  The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product.  The user would need to open a malicious file provided to them by the attacker for the code to execute.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨界内存读
Source: NVD (National Vulnerability Database)
Vulnerability Title
Rockwell Automation Arena Simulation Software 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Rockwell Automation Arena Simulation Software是美国罗克韦尔(Rockwell Automation)公司的一套提供3D动画和图形功能的仿真软件。 Rockwell Automation Arena Simulation存在安全漏洞,该漏洞源于存在任意代码执行漏洞,该漏洞可能允许恶意用户利用内存缓冲区溢出向软件提交未经授权的任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Rockwell AutomationArena Simulation All versions before 16.20.02 Patch -
II. Public POCs for CVE-2023-27854
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-27854
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-27854

No comments yet


Leave a comment