First published: Tue Jul 11 2023(Updated: )
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application is vulnerable to stack-based buffer overflow while parsing specially crafted SPP files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21060)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Tecnomatix | >=2201<2201.0008 | |
Siemens Tecnomatix | >=2302<2302.0002 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37375 is a vulnerability found in Tecnomatix Plant Simulation V2201 and V2302.
CVE-2023-37375 allows an attacker to exploit a stack-based buffer overflow in Tecnomatix Plant Simulation while parsing specially crafted SPP files.
CVE-2023-37375 has a severity level of high (7 out of 10).
To fix CVE-2023-37375, it is recommended to update Tecnomatix Plant Simulation to version V2201.0008 or V2302.0002, as appropriate.
More information about CVE-2023-37375 can be found at the following link: https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf