First published: Tue Mar 11 2025(Updated: )
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files. An attacker could leverage this vulnerability to execute code in the context of the current process.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Teamcenter Visualization | <14.3.0.13<2312.0009<2406.0007<2412.0002 | |
Siemens Tecnomatix Plant Simulation | <2302.0021<2404.0010 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-23402 has been classified with a medium severity level due to the potential for unauthorized access.
To remediate CVE-2025-23402, update Teamcenter Visualization or Tecnomatix Plant Simulation to the latest version specified in the advisory.
CVE-2025-23402 affects multiple versions of Teamcenter Visualization and Tecnomatix Plant Simulation prior to the specified patch releases.
Yes, CVE-2025-23402 can be exploited remotely, which increases the risk to the affected systems.
If you are unable to update your software to fix CVE-2025-23402, consider implementing temporary mitigations and monitoring for unusual activity.