A local code execution security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.
History

Wed, 12 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation
Rockwellautomation studio 5000 Simulation Interface
Vendors & Products Rockwellautomation
Rockwellautomation studio 5000 Simulation Interface

Tue, 11 Nov 2025 14:00:00 +0000

Type Values Removed Values Added
Description A local code execution security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.
Title Studio 5000 ® Simulation Interface Local Code Execution
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 8.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published: 2025-11-11T13:49:49.524Z

Updated: 2025-11-12T20:03:12.471Z

Reserved: 2025-10-13T16:22:55.094Z

Link: CVE-2025-11697

cve-icon Vulnrichment

Updated: 2025-11-12T14:54:29.989Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-11T14:15:34.787

Modified: 2025-11-12T16:19:34.210

Link: CVE-2025-11697

cve-icon Redhat

No data.