Source

CISA_ICS

Published

4-10-2025

CVE IDs

CVE-2025-2285 CVE-2025-2286 CVE-2025-2287 CVE-2025-2288 CVE-2025-2293 CVE-2025-2829 CVE-2025-3285 CVE-2025-3286 CVE-2025-3287 CVE-2025-3288 CVE-2025-3289

Affected Products

Arena

Summary

Successful exploitation of these vulnerabilities could disclose information to an attacker or allow execution of arbitrary code on the system.

References

https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-07https://www.cve.org/CVERecord?id=CVE-2025-2285https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:Hhttps://www.cve.org/CVERecord?id=CVE-2025-2286https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:Hhttps://www.cve.org/CVERecord?id=CVE-2025-2287https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:Hhttps://www.cve.org/CVERecord?id=CVE-2025-2288https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:Hhttps://www.cve.org/CVERecord?id=CVE-2025-2293https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:Hhttps://www.cve.org/CVERecord?id=CVE-2025-2829https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:Hhttps://www.cve.org/CVERecord?id=CVE-2025-3285https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:Hhttps://www.cve.org/CVERecord?id=CVE-2025-3286https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:Hhttps://www.cve.org/CVERecord?id=CVE-2025-3287https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:Hhttps://www.cve.org/CVERecord?id=CVE-2025-3288https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:Hhttps://www.cve.org/CVERecord?id=CVE-2025-3289https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H