Siemens Questa and ModelSim
ModelSim Simulation and Questa Simulation store design data in unencrypted form on disk. An attacker with local access to a computer running these tools can read the unencrypted design intellectual property (IP) data, including hardware designs and verification logic. This vulnerability affects all versions of both products. The vulnerability is not remotely exploitable and requires local system access. Siemens recommends upgrading to the latest versions when available, though no specific patched versions are currently identified.
- Local access to the computer running ModelSim or Questa
- The ability to read files on the affected system
- Design IP data stored in unencrypted form on disk
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ccf64292-1915-4260-9019-c12a6a1f52c9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.