Vulnerabilities (CVE)

Filtered by vendor Siemens Subscribe
Filtered by product Questa
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-47194 1 Siemens 2 Modelsim, Questa 2024-10-16 N/A 7.3 HIGH
A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). vish2.exe in affected applications allows a specific DLL file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vish2.exe from a user-writable directory.
CVE-2024-47195 1 Siemens 2 Modelsim, Questa 2024-10-16 N/A 7.3 HIGH
A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). gdb.exe in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch gdb.exe from a user-writable directory.
CVE-2024-47196 1 Siemens 2 Modelsim, Questa 2024-10-16 N/A 7.3 HIGH
A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). vsimk.exe in affected applications allows a specific tcl file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vsimk.exe from a user-writable directory.
CVE-2021-42023 1 Siemens 2 Modelsim, Questa 2024-02-04 2.1 LOW 6.5 MEDIUM
A vulnerability has been identified in ModelSim Simulation (All versions), Questa Simulation (All versions). The RSA white-box implementation in affected applications insufficiently protects the built-in private keys that are required to decrypt electronic intellectual property (IP) data in accordance with the IEEE 1735 recommended practice. This could allow a sophisticated attacker to discover the keys, bypassing the protection intended by the IEEE 1735 recommended practice.