First published: Tue Jul 11 2023(Updated: )
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application is vulnerable to stack-based buffer overflow while parsing specially crafted STP files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21054)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Tecnomatix | >=2201<2201.0008 | |
Siemens Tecnomatix | >=2302<2302.0002 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-37374.
The severity of CVE-2023-37374 is high.
Tecnomatix Plant Simulation V2201 (All versions < V2201.0008) and Tecnomatix Plant Simulation V2302 (All versions < V2302.0002) are affected.
The vulnerability is a stack-based buffer overflow while parsing specially crafted STP files.
Siemens has released a security advisory with recommendations to mitigate the vulnerability. Please refer to the reference link for more information.