Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Rockwell Arena Simulation Vulnerabilities Let Attackers Execute Malicious Code Remotely

Posted on August 6, 2025August 6, 2025 By CWS

Rockwell Automation has disclosed three important reminiscence corruption vulnerabilities in its Area® Simulation software program that would enable menace actors to execute arbitrary code remotely on affected methods. 

The safety flaws, recognized as CVE-2025-7025, CVE-2025-7032, and CVE-2025-7033, carry a excessive CVSS 4.0 base rating of 8.4 and have an effect on all variations 16.20.09 and prior. 

The vulnerabilities had been found internally throughout routine testing by safety researcher Michael Heinzl and have been addressed in model 16.20.10, launched on August 5, 2025.

Key Takeaways1. Three important vulnerabilities in Rockwell Area® Simulation allow distant code execution.2. Exploitation requires person interplay with malicious information or web sites.3. Replace instantly or implement strict file dealing with controls.

Rockwell Area Reminiscence Corruption Flaws 

The three newly disclosed vulnerabilities characterize severe reminiscence abuse points that may power Area Simulation to learn and write past allotted reminiscence boundaries. 

CVE-2025-7025 entails an out-of-bounds learn vulnerability (CWE-125), whereas CVE-2025-7032 exploits a stack-based buffer overflow (CWE-121), and CVE-2025-7033 leverages a heap-based buffer overflow (CWE-122). 

All three flaws share equivalent CVSS vectors of CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N, indicating native assault vectors requiring person interplay by malicious information or webpages.

The assault methodology requires social engineering to trick customers into opening specifically crafted information or visiting compromised web sites. 

As soon as profitable, menace actors can obtain arbitrary code execution with excessive influence on the confidentiality, integrity, and availability of the focused system. 

The vulnerabilities don’t require elevated privileges, making them notably harmful in enterprise environments the place Area Simulation is often deployed for manufacturing and course of optimization.

Every vulnerability carries a CVSS 3.1 base rating of seven.8, with the assault vector categorised as native (AV:L) with low complexity (AC:L) and no required privileges (PR:N). 

The Widespread Weak spot Enumeration (CWE) classifications spotlight basic reminiscence administration points that would result in info disclosure or full system compromise.

Safety analysts word that whereas the vulnerabilities will not be presently listed in CISA’s Identified Exploited Vulnerability (KEV) database, the excessive CVSS scores and potential for code execution warrant speedy consideration. 

CVE IDTitleCVSS 3.1 ScoreSeverityCVE-2025-7025Arena® Simulation Out-of-bounds Learn Vulnerability7.8HighCVE-2025-7032Arena® Simulation Stack-based Buffer Overflow7.8HighCVE-2025-7033Arena® Simulation Heap-based Buffer Overflow7.8High

Mitigations

Rockwell Automation strongly recommends speedy deployment of Area Simulation model 16.20.10 or later to handle all three vulnerabilities. 

Organizations unable to improve instantly ought to implement complete safety greatest practices, together with limiting file entry permissions, implementing utility whitelisting, and conducting person consciousness coaching about suspicious file dealing with. 

Community segmentation and endpoint detection options can present extra layers of safety in opposition to potential exploitation makes an attempt focusing on these reminiscence corruption flaws.

Equip your SOC with full entry to the most recent menace information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Arena, Attackers, Code, Execute, Malicious, Remotely, Rockwell, Simulation, Vulnerabilities

Post navigation

Previous Post: Sophisticated DevilsTongue Windows Spyware Tracking Users Globally
Next Post: Ox Security Launches AI Agent That Auto-Generates Code to Fix Vulnerabilities

Related Posts

Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows Cyber Security News
Blockchain for Cybersecurity Real-World Applications and Limits Cyber Security News
New Ghost-tapping Attacks Steal Customers’ Cards Linked to Services Like Apple Pay and Google Pay Cyber Security News
New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change Cyber Security News
New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data Cyber Security News
Lazarus Hackers Trick Users Into Believing Their Camera or Microphone is Blocked to Deliver PyLangGhost RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch
  • Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments
  • Subtle Snail Mimic as HR Representatives to Engage Employees and Steal Login Credentials
  • ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks
  • Kawa4096 Ransomware Attacking Multinational Organizations to Exfiltrate Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch
  • Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments
  • Subtle Snail Mimic as HR Representatives to Engage Employees and Steal Login Credentials
  • ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks
  • Kawa4096 Ransomware Attacking Multinational Organizations to Exfiltrate Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News