First published: Mon Nov 18 2024(Updated: )
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Teamcenter Visualization V2406 (All versions < V2406.0005), Tecnomatix Plant Simulation V2302 (All versions < V2302.0018), Tecnomatix Plant Simulation V2404 (All versions < V2404.0007). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24521)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Tecnomatix Plant Simulation | <2302.0018 | |
Siemens Tecnomatix Plant Simulation | >=2404.0<2404.0007 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52573 has a high severity rating due to its potential impact on affected systems.
CVE-2024-52573 affects Teamcenter Visualization versions prior to V14.2.0.14, V14.3.0.12, V2312.0008, and V2406.0005, as well as specific earlier versions of Tecnomatix Plant Simulation.
To fix CVE-2024-52573, users should update the affected software to the latest versions that contain security patches for this vulnerability.
The impact of CVE-2024-52573 can include unauthorized access or exploitation of the affected software, potentially leading to data loss or system compromise.
Currently, no specific workarounds are provided for CVE-2024-52573, and updating to a patched version is the recommended approach.