First published: Tue Aug 08 2023(Updated: )
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21132)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Tecnomatix | >=2201<2201.0008 | |
Siemens Tecnomatix | >=2302<2302.0002 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Tecnomatix Plant Simulation vulnerability is CVE-2023-38680.
The affected software for this vulnerability is Siemens Tecnomatix V2201 (All versions < V2201.0008) and Tecnomatix Plant Simulation V2302 (All versions < V2302.0002).
The severity rating of CVE-2023-38680 is high (7.8).
The vulnerability can be exploited by parsing a specially crafted SPP file that triggers an out of bounds write past the end of an allocated buffer.
Siemens has released a security advisory with recommendations for mitigations, and it is recommended to update to Tecnomatix Plant Simulation V2201.0008 or V2302.0002 to address the vulnerability.