A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application is vulnerable to stack-based buffer while parsing specially crafted SPP files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-20449)
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | Vendor Advisory |
| https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:52
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf - Vendor Advisory |
16 Mar 2023, 18:58
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:* | |
| CWE | CWE-787 | |
| References | (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf - Vendor Advisory |
14 Mar 2023, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-03-14 10:15
Updated : 2024-11-21 07:52
NVD link : CVE-2023-27406
Mitre link : CVE-2023-27406
CVE.ORG link : CVE-2023-27406
JSON object : View
Products Affected
siemens
- tecnomatix_plant_simulation
