Siemens Teamcenter Active Workspace
Monitor4.5ICS-CERT ICSA-21-257-22Sep 14, 2021
Attack VectorNetwork
Auth RequiredHigh
ComplexityLow
User InteractionRequired
Summary
Teamcenter Active Workspace versions prior to 4.3.10, 5.0.8, 5.1.5, and 5.2.1 contain a path traversal vulnerability (CWE-22) that could allow an authenticated high-privilege user to bypass access controls and read files outside the intended directory structure. The vulnerability requires user interaction and does not enable modification of data or service disruption.
What this means
What could happen
An attacker with high privileges could access files outside the intended directory structure on the Teamcenter server, potentially reading sensitive product design data, manufacturing specifications, or other confidential information stored in the system.
Who's at risk
Organizations using Siemens Teamcenter Active Workspace for product lifecycle management (PLM), particularly those handling sensitive engineering designs, manufacturing data, and intellectual property. This affects engineering departments, manufacturing firms, and any organization managing design and configuration data through Teamcenter.
How it could be exploited
An authenticated attacker with high privileges could craft a malicious request containing path traversal sequences (e.g., "../") to bypass directory restrictions and access arbitrary files on the Teamcenter Active Workspace server. This requires the attacker to already have valid high-privilege credentials and for a user to interact with the crafted input.
Prerequisites
- Valid high-privilege (administrator or power-user) credentials for Teamcenter Active Workspace
- Network access to the Teamcenter Active Workspace application
- User interaction required—the attacker must convince an administrator to interact with the malicious input
Requires high-privilege credentialsUser interaction requiredLow EPSS score (0.6%) indicates low probability of exploitationPath traversal could expose sensitive design and manufacturing data
Exploitability
Low exploit probability (EPSS 0.6%)
Affected products (4)
4 with fix
ProductAffected VersionsFix Status
Teamcenter Active Workspace V4.3<V4.3.104.3.10
Teamcenter Active Workspace V5.0<V5.0.85.0.8
Teamcenter Active Workspace V5.1<V5.1.55.1.5
Teamcenter Active Workspace V5.2<V5.2.15.2.1
Remediation & Mitigation
0/6
Schedule — requires maintenance window
0/4Patching may require device reboot — plan for process interruption
Teamcenter Active Workspace V4.3
HOTFIXUpdate Teamcenter Active Workspace v4.3 to version 4.3.10 or later
Teamcenter Active Workspace V5.0
HOTFIXUpdate Teamcenter Active Workspace v5.0 to version 5.0.8 or later
Teamcenter Active Workspace V5.1
HOTFIXUpdate Teamcenter Active Workspace v5.1 to version 5.1.5 or later
Teamcenter Active Workspace V5.2
HOTFIXUpdate Teamcenter Active Workspace v5.2 to version 5.2.1 or later
Long-term hardening
0/2HARDENINGRestrict physical and local network access to the Teamcenter application host to authorized personnel only
HARDENINGPlace Teamcenter Active Workspace behind a firewall and isolate it from the business network if possible
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/ad5c9164-5e78-4219-a59a-d94692484026