First published: Tue Oct 08 2024(Updated: )
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Tecnomatix Plant Simulation | <2302.0016 | |
Siemens Tecnomatix Plant Simulation | >=2303.0000<2404.0005 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-45466 is categorized as high, indicating that it presents significant risk to the affected software.
To fix CVE-2024-45466, update to the respective patched versions of Teamcenter Visualization or Tecnomatix Plant Simulation as indicated in the vulnerability advisory.
CVE-2024-45466 affects specific versions of Teamcenter Visualization and Tecnomatix Plant Simulation, including all versions below V14.2.0.14, V14.3.0.12, V2312.0008, and V2302.0016.
Currently, the primary resolution for CVE-2024-45466 is to upgrade to the latest secure versions, as no viable workarounds have been identified.
If exploited, CVE-2024-45466 could lead to unauthorized access or manipulation of sensitive data within the affected Siemens software environments.