Rockwell Automation Arena® suffers from a
stack-based buffer overflow vulnerability. The specific flaw exists within the
parsing of DOE files. Local attackers are able to exploit this issue to
potentially execute arbitrary code on affected installations of Arena®. Exploiting
the vulnerability requires opening a malicious DOE file.
References
| Link | Resource |
|---|---|
| https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1763.html | Vendor Advisory |
Configurations
History
17 Nov 2025, 17:48
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Rockwellautomation
Rockwellautomation arena |
|
| References | () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1763.html - Vendor Advisory | |
| CPE | cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
14 Nov 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-14 14:15
Updated : 2025-11-17 17:48
NVD link : CVE-2025-11918
Mitre link : CVE-2025-11918
CVE.ORG link : CVE-2025-11918
JSON object : View
Products Affected
rockwellautomation
- arena
CWE
CWE-121
Stack-based Buffer Overflow
