ID

VAR-202507-0649


CVE

CVE-2025-6376


TITLE

Rockwell Automation  of  Arena  Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2025-008853

DESCRIPTION

A remote code execution security issue exists in the Rockwell Automation Arena®.   A crafted DOE file can force Arena Simulation to write beyond the boundaries of an allocated object. Exploitation requires user interaction, such as opening a malicious file within the software. If exploited, a threat actor could execute arbitrary code on the target system. The software must run under the context of the administrator in order to cause worse case impact. This is reflected in the Rockwell CVSS score, as AT:P. Rockwell Automation of Arena Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process

Trust: 2.79

sources: NVD: CVE-2025-6376 // JVNDB: JVNDB-2025-008853 // ZDI: ZDI-25-836 // CNVD: CNVD-2025-19255

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-19255

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:arenascope:ltversion:16.20.09

Trust: 1.0

vendor:rockwell automationmodel:arenascope:eqversion: -

Trust: 0.8

vendor:rockwell automationmodel:arenascope:eqversion:16.20.09

Trust: 0.8

vendor:rockwell automationmodel:arenascope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:arena simulationscope: - version: -

Trust: 0.7

vendor:rockwellmodel:automation arenascope: - version: -

Trust: 0.6

sources: ZDI: ZDI-25-836 // CNVD: CNVD-2025-19255 // JVNDB: JVNDB-2025-008853 // NVD: CVE-2025-6376

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2025-6376
value: HIGH

Trust: 1.0

PSIRT@rockwellautomation.com: CVE-2025-6376
value: HIGH

Trust: 1.0

NVD: CVE-2025-6376
value: HIGH

Trust: 0.8

ZDI: CVE-2025-6376
value: HIGH

Trust: 0.7

CNVD: CNVD-2025-19255
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-19255
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2025-6376
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2025-6376
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2025-6376
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-25-836 // CNVD: CNVD-2025-19255 // JVNDB: JVNDB-2025-008853 // NVD: CVE-2025-6376 // NVD: CVE-2025-6376

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:CWE-787

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [ others ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-008853 // NVD: CVE-2025-6376

PATCH

title:Rockwell Automation has issued an update to correct this vulnerability.url:https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1729.html

Trust: 0.7

sources: ZDI: ZDI-25-836

EXTERNAL IDS

db:NVDid:CVE-2025-6376

Trust: 3.9

db:JVNDBid:JVNDB-2025-008853

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-26556

Trust: 0.7

db:ZDIid:ZDI-25-836

Trust: 0.7

db:CNVDid:CNVD-2025-19255

Trust: 0.6

sources: ZDI: ZDI-25-836 // CNVD: CNVD-2025-19255 // JVNDB: JVNDB-2025-008853 // NVD: CVE-2025-6376

REFERENCES

url:https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.sd1729.html

Trust: 3.1

url:https://nvd.nist.gov/vuln/detail/cve-2025-6376

Trust: 0.8

sources: ZDI: ZDI-25-836 // CNVD: CNVD-2025-19255 // JVNDB: JVNDB-2025-008853 // NVD: CVE-2025-6376

CREDITS

Simon (@esj4y) Janz

Trust: 0.7

sources: ZDI: ZDI-25-836

SOURCES

db:ZDIid:ZDI-25-836
db:CNVDid:CNVD-2025-19255
db:JVNDBid:JVNDB-2025-008853
db:NVDid:CVE-2025-6376

LAST UPDATE DATE

2025-10-16T23:21:30.371000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-25-836date:2025-08-13T00:00:00
db:CNVDid:CNVD-2025-19255date:2025-08-22T00:00:00
db:JVNDBid:JVNDB-2025-008853date:2025-07-15T01:29:00
db:NVDid:CVE-2025-6376date:2025-07-11T18:35:53.330

SOURCES RELEASE DATE

db:ZDIid:ZDI-25-836date:2025-08-13T00:00:00
db:CNVDid:CNVD-2025-19255date:2025-08-22T00:00:00
db:JVNDBid:JVNDB-2025-008853date:2025-07-15T00:00:00
db:NVDid:CVE-2025-6376date:2025-07-09T21:15:28.423