{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T21:12:29.130","vulnerabilities":[{"cve":{"id":"CVE-2024-2929","sourceIdentifier":"PSIRT@rockwellautomation.com","published":"2024-03-26T16:15:14.230","lastModified":"2024-12-17T16:14:25.233","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"\nA memory corruption vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by corrupting the memory triggering an access violation.  Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.\n\n"},{"lang":"es","value":"Una vulnerabilidad de corrupción de memoria en el software Rockwell Automation Arena Simulation podría permitir que un usuario malintencionado inserte código no autorizado en el software corrompiendo la memoria y provocando una infracción de acceso. Una vez dentro, el actor de la amenaza puede ejecutar código dañino en el sistema. Esto afecta la confidencialidad, integridad y disponibilidad del producto. Para desencadenar esto, el usuario tendría que abrir, sin saberlo, un archivo malicioso compartido por el actor de la amenaza."}],"metrics":{"cvssMetricV31":[{"source":"PSIRT@rockwellautomation.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"PSIRT@rockwellautomation.com","type":"Secondary","description":[{"lang":"en","value":"CWE-119"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*","versionStartIncluding":"16.00.00","versionEndExcluding":"16.20.03","matchCriteriaId":"7433512B-62BB-4412-BFBA-6EA4679B3778"}]}]}],"references":[{"url":"https://www.rockwellautomation.com/en-us/support/advisory.SD-1665.html","source":"PSIRT@rockwellautomation.com","tags":["Broken Link"]},{"url":"https://www.rockwellautomation.com/en-us/support/advisory.SD-1665.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]}]}}]}