PatchSiren cyber security CVE debrief
CVE-2025-3287 Rockwell Automation CVE debrief
CVE-2025-3287 is a high-severity local code execution vulnerability in Rockwell Automation Arena. According to the CISA advisory, a legitimate user must open a malicious DOE file, and improper validation of user-supplied data can lead to reading outside the allocated memory buffer. The reported impact includes information disclosure and arbitrary code execution on the system. Rockwell Automation advises upgrading to Arena V16.20.09 or later.
- Vendor
- Rockwell Automation
- Product
- Arena
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-10
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-10
- Advisory updated
- 2025-05-06
Who should care
OT/ICS security teams, engineering workstation administrators, and organizations running Rockwell Automation Arena, especially where users open DOE files on shared or production-adjacent systems.
Technical summary
The advisory describes a local vulnerability in Rockwell Automation Arena caused by improper validation of user-supplied data, resulting in an out-of-bounds read from an allocated memory buffer. Exploitation requires a legitimate user to open a malicious DOE file. The supplied CVSS vector is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, reflecting a local attack that requires user interaction but can affect confidentiality, integrity, and availability. Affected product scope in the source advisory is Rockwell Automation Arena <=16.20.08, with remediation available in V16.20.09 or later.
Defensive priority
High — prioritize systems that run Arena and regularly process DOE files, especially engineering workstations and OT-connected endpoints.
Recommended defensive actions
- Upgrade Rockwell Automation Arena to V16.20.09 or later.
- Review and restrict who can open DOE files on engineering workstations and related OT systems.
- Apply CISA and Rockwell Automation industrial control system security best practices to reduce exposure and limit impact.
- Monitor for unexpected DOE file activity and investigate any suspicious file sources before opening them.
- Validate that affected versions <=16.20.08 are inventoried so patching can be completed quickly.
Evidence notes
Primary source is CISA advisory ICSA-25-100-07, published 2025-04-10 and revised 2025-05-06 with revision history noting typos-only fixes. The supplied CSAF data lists Rockwell Automation Arena <=16.20.08 as affected and recommends upgrading to V16.20.09 or later. The provided data also marks the issue as not KEV-listed.
Official resources
-
CVE-2025-3287 CVE record
CVE.org
-
CVE-2025-3287 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA publicly disclosed the issue as ICSA-25-100-07 on 2025-04-10 and later revised the advisory on 2025-05-06 for typo corrections only; the supplied data does not list the CVE in CISA KEV.