Siemens Teamcenter
Siemens Teamcenter is affected by two vulnerabilities: an XML External Entity Injection (XXE, CVE-2022-29801) and a stack-based buffer overflow (CVE-2022-24290). The XXE vulnerability impacts Teamcenter versions before V13.1. Both vulnerabilities allow a local attacker to achieve arbitrary code execution. Siemens has released patches for all affected versions: Teamcenter V12.4 (update to 12.4.0.13 or later), V13.0 (update to 13.0.0.9 or later), V13.1 (update to 13.1.0.9 or later), V13.2 (update to 13.2.0.8 or later), V13.3 (update to 13.3.0.3 or later), and V14.0 (update to 14.0.0.2 or later).
- Local access to a Teamcenter workstation or server
- User interaction to open a malicious file or trigger the buffer overflow (for XXE in versions before V13.1)
- Vulnerable Teamcenter version installed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/31b329a1-05ac-47a6-9f37-9ec7c9c773f4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.