WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Rockwell Automation Arena Simulation Software (Update A) (ICSA-19-213-05)
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Rockwell Automation Arena Simulation Software (Update A) (ICSA-19-213-05)

Author: Charles Egli

Created: Tuesday, September 10, 2019 - 13:28

Categories: Cybersecurity

September 5, 2019

The NCCIC has updated this advisory with additional details on the nature of the vulnerabilities, the technical details of the affected products, and mitigation measures. Read the advisory at CISA.

August 1, 2019

The NCCIC has published an advisory on use after free and information exposure vulnerabilities in Rockwell Automation Arena Simulation Software. Versions 16.00.00 and earlier are affected. Successful exploitation of these vulnerabilities could allow an attacker to cause a current Arena session to fault or enter a denial-of-service (DoS) state, allowing the attacker to run arbitrary code. Rockwell Automation has released Version 16.00.01 of Arena Simulation Software to address the reported vulnerabilities. It also recommends users take a series of steps. The NCCIC also advises of a series of measures for mitigating the vulnerability. Read the advisory at CISA.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar