Siemens Teamcenter
Siemens Teamcenter is affected by three vulnerabilities: incorrect privilege assignment (CWE-267), Insecure Direct Object Reference / IDOR (CWE-639), and XML External Entity Injection / XXE (CWE-611). These vulnerabilities can allow an authenticated attacker with high privileges to bypass access controls and access restricted data, or allow any user to execute arbitrary code by opening a crafted malicious file. Affected versions are Teamcenter 12.4 (before 12.4.0.8), 13.0 (before 13.0.0.7), 13.1 (before 13.1.0.5), and 13.2 (before 13.2.0.2). Siemens has released patched versions for all affected product lines.
- Network access to Teamcenter application server or web interface
- High-level user credentials (administrator or engineering role) for privilege escalation exploits
- For XXE: ability to deliver a malicious file to a Teamcenter user and convince them to open it
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6e79e76f-1c35-4e7d-9d85-d1df2e1185d2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.