Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Rockwell Arena Simulation Vulnerabilities Let Attackers Execute Malicious Code Remotely

Posted on August 6, 2025August 6, 2025 By CWS

Rockwell Automation has disclosed three important reminiscence corruption vulnerabilities in its Area® Simulation software program that would enable menace actors to execute arbitrary code remotely on affected methods. 

The safety flaws, recognized as CVE-2025-7025, CVE-2025-7032, and CVE-2025-7033, carry a excessive CVSS 4.0 base rating of 8.4 and have an effect on all variations 16.20.09 and prior. 

The vulnerabilities had been found internally throughout routine testing by safety researcher Michael Heinzl and have been addressed in model 16.20.10, launched on August 5, 2025.

Key Takeaways1. Three important vulnerabilities in Rockwell Area® Simulation allow distant code execution.2. Exploitation requires person interplay with malicious information or web sites.3. Replace instantly or implement strict file dealing with controls.

Rockwell Area Reminiscence Corruption Flaws 

The three newly disclosed vulnerabilities characterize severe reminiscence abuse points that may power Area Simulation to learn and write past allotted reminiscence boundaries. 

CVE-2025-7025 entails an out-of-bounds learn vulnerability (CWE-125), whereas CVE-2025-7032 exploits a stack-based buffer overflow (CWE-121), and CVE-2025-7033 leverages a heap-based buffer overflow (CWE-122). 

All three flaws share equivalent CVSS vectors of CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N, indicating native assault vectors requiring person interplay by malicious information or webpages.

The assault methodology requires social engineering to trick customers into opening specifically crafted information or visiting compromised web sites. 

As soon as profitable, menace actors can obtain arbitrary code execution with excessive influence on the confidentiality, integrity, and availability of the focused system. 

The vulnerabilities don’t require elevated privileges, making them notably harmful in enterprise environments the place Area Simulation is often deployed for manufacturing and course of optimization.

Every vulnerability carries a CVSS 3.1 base rating of seven.8, with the assault vector categorised as native (AV:L) with low complexity (AC:L) and no required privileges (PR:N). 

The Widespread Weak spot Enumeration (CWE) classifications spotlight basic reminiscence administration points that would result in info disclosure or full system compromise.

Safety analysts word that whereas the vulnerabilities will not be presently listed in CISA’s Identified Exploited Vulnerability (KEV) database, the excessive CVSS scores and potential for code execution warrant speedy consideration. 

CVE IDTitleCVSS 3.1 ScoreSeverityCVE-2025-7025Arena® Simulation Out-of-bounds Learn Vulnerability7.8HighCVE-2025-7032Arena® Simulation Stack-based Buffer Overflow7.8HighCVE-2025-7033Arena® Simulation Heap-based Buffer Overflow7.8High

Mitigations

Rockwell Automation strongly recommends speedy deployment of Area Simulation model 16.20.10 or later to handle all three vulnerabilities. 

Organizations unable to improve instantly ought to implement complete safety greatest practices, together with limiting file entry permissions, implementing utility whitelisting, and conducting person consciousness coaching about suspicious file dealing with. 

Community segmentation and endpoint detection options can present extra layers of safety in opposition to potential exploitation makes an attempt focusing on these reminiscence corruption flaws.

Equip your SOC with full entry to the most recent menace information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Arena, Attackers, Code, Execute, Malicious, Remotely, Rockwell, Simulation, Vulnerabilities

Post navigation

Previous Post: Sophisticated DevilsTongue Windows Spyware Tracking Users Globally
Next Post: Ox Security Launches AI Agent That Auto-Generates Code to Fix Vulnerabilities

Related Posts

Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack Cyber Security News
Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload Cyber Security News
New Phishing Attack Impersonates as DWP Attacking Users to Steal Credit Card Data Cyber Security News
Top Ransomware Actors Actively Attacking Financial Sector, 406 Incidents Publicly Disclosed Cyber Security News
Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services Cyber Security News
Microsoft Patched Windows Server 2025 Restart Bug Disconnects AD Domain Controller Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday
  • Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands
  • How to Secure Docker Containers
  • Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems
  • Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday
  • Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands
  • How to Secure Docker Containers
  • Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems
  • Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News