First published: Mon Nov 18 2024(Updated: )
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Teamcenter Visualization V2406 (All versions < V2406.0005), Tecnomatix Plant Simulation V2302 (All versions < V2302.0018), Tecnomatix Plant Simulation V2404 (All versions < V2404.0007). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-24543)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Tecnomatix Plant Simulation | <2302.0018 | |
Siemens Tecnomatix Plant Simulation | >=2404.0<2404.0007 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52574 has been classified with a high severity due to potential exploitation risks affecting multiple versions of Teamcenter Visualization and Tecnomatix Plant Simulation.
To mitigate CVE-2024-52574, users should upgrade to the latest versions specified in the advisory for Teamcenter Visualization and Tecnomatix Plant Simulation.
CVE-2024-52574 affects Teamcenter Visualization versions earlier than V14.2.0.14, V14.3.0.12, V2312.0008, and V2406.0005, as well as specific versions of Tecnomatix Plant Simulation.
Yes, CVE-2024-52574 may allow remote exploitation under certain conditions, making it critical to address the vulnerability promptly.
If immediate upgrade is not possible for CVE-2024-52574, consider implementing temporary security controls to limit exposure and monitor for any unusual activity.