First published: Tue Sep 14 2021(Updated: )
A vulnerability has been identified in Teamcenter Active Workspace V4.3 (All versions < V4.3.10), Teamcenter Active Workspace V5.0 (All versions < V5.0.8), Teamcenter Active Workspace V5.1 (All versions < V5.1.5), Teamcenter Active Workspace V5.2 (All versions < V5.2.1). A path traversal vulnerability in the application could allow an attacker to bypass certain restrictions such as direct access to other services within the host.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Teamcenter Active Workspace | >=4.3.0<4.3.10 | |
Siemens Teamcenter Active Workspace | >=5.0.0<5.0.8 | |
Siemens Teamcenter Active Workspace | >=5.1.0<5.1.5 | |
Siemens Teamcenter Active Workspace | >=5.2.0<5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40357 is a vulnerability in Teamcenter Active Workspace versions 4.3.0 to 4.3.10, 5.0.0 to 5.0.8, 5.1.0 to 5.1.5, and 5.2.0 to 5.2.1 that allows path traversal.
CVE-2021-40357 has a severity score of 4.9, classified as medium.
CVE-2021-40357 affects Teamcenter Active Workspace versions 4.3.0 to 4.3.10, 5.0.0 to 5.0.8, 5.1.0 to 5.1.5, and 5.2.0 to 5.2.1.
To fix the CVE-2021-40357 vulnerability, update Teamcenter Active Workspace to version 4.3.10, 5.0.8, 5.1.5, or 5.2.1 or later.
More information about CVE-2021-40357 can be found on the Siemens ProductCERT website: https://cert-portal.siemens.com/productcert/pdf/ssa-413407.pdf