First published: Tue Oct 10 2023(Updated: )
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Tecnomatix | >=2201<2201.0009 | |
Siemens Tecnomatix | >=2302<2302.0003 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44081 has a severity rating of 7.8 (high).
CVE-2023-44081 affects Siemens Tecnomatix V2201 (All versions < V2201.0009) and Tecnomatix V2302 (All versions < V2302.0003).
CVE-2023-44081 exploits an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file.
Siemens has released a security advisory with mitigation steps for CVE-2023-44081.
More information about CVE-2023-44081 can be found in the Siemens ProductCERT security advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf