Siemens Teamcenter Active Workspace
Siemens Teamcenter Active Workspace versions before 4.3.9, 5.0.7, and 5.1.4 contain multiple vulnerabilities: information disclosure (CWE-200) allowing unauthorized access to sensitive data, reflected cross-site scripting (CWE-79) that can steal user sessions and credentials when users click malicious links, and information exposure in error messages (CWE-209). An attacker could craft a link or file that, when opened by a logged-in user, executes JavaScript in their browser context to harvest session tokens or project data, or reveal sensitive information through error responses.
- User must click on attacker-provided link or open untrusted file in Teamcenter Active Workspace
- User must be logged into Teamcenter Active Workspace with valid credentials
- Teamcenter Active Workspace must be network-accessible to the attacker or user
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d4607209-e761-4fcd-9f10-48cdcc4d9deaGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.