First published: Wed Aug 10 2022(Updated: )
A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.15), Teamcenter V13.0 (All versions < V13.0.0.10), Teamcenter V13.1 (All versions < V13.1.0.10), Teamcenter V13.2 (All versions < V13.2.0.9), Teamcenter V13.3 (All versions < V13.3.0.5), Teamcenter V14.0 (All versions < V14.0.0.2). File Server Cache service in Teamcenter consist of a functionality that is vulnerable to command injection. This could potentially allow an attacker to perform remote code execution.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Teamcenter | >=12.4<12.4.0.15 | |
Siemens Teamcenter | >=13.0<13.0.0.10 | |
Siemens Teamcenter | >=13.1<13.1.0.10 | |
Siemens Teamcenter | >=13.2<13.2.0.9 | |
Siemens Teamcenter | >=13.3<13.3.0.5 | |
Siemens Teamcenter | >=14.0<14.0.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34660 has a high severity rating due to the potential for unauthorized access to sensitive data.
To mitigate CVE-2022-34660, you should upgrade Teamcenter to versions V12.4.0.15 or later, V13.0.0.10 or later, V13.1.0.10 or later, V13.2.0.9 or later, V13.3.0.5 or later, or V14.0.0.2 or later.
CVE-2022-34660 affects several versions of Siemens Teamcenter, specifically all versions prior to V12.4.0.15, V13.0.0.10, V13.1.0.10, V13.2.0.9, V13.3.0.5, and V14.0.0.2.
CVE-2022-34660 is categorized as an authentication or authorization vulnerability which can lead to unauthorized data access.
Yes, Siemens has released patches in the newer versions of Teamcenter to address CVE-2022-34660.