First published: Tue Oct 10 2023(Updated: )
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Tecnomatix | >=2201<2201.0009 | |
Siemens Tecnomatix | >=2302<2302.0003 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44083 is a vulnerability identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009) and Tecnomatix Plant Simulation V2302 (All versions < V2302.0003).
The severity of CVE-2023-44083 is high, with a severity value of 7.8.
This vulnerability can be exploited by parsing a specially crafted SPP file, which can trigger an out of bounds write past the end of an allocated buffer.
The affected software for CVE-2023-44083 is Siemens Tecnomatix, specifically versions prior to V2201.0009 for Tecnomatix Plant Simulation V2201 and versions prior to V2302.0003 for Tecnomatix Plant Simulation V2302.
Siemens has released a security advisory with mitigation measures for CVE-2023-44083. Please refer to the reference link for more information.