Siemens Tecnomatix Plant Simulation
Tecnomatix Plant Simulation contains multiple buffer overflow and out-of-bounds memory access vulnerabilities in the WRL, PSOBJ, and SPP file parsers. When a user opens a malicious file in one of these formats, the application could crash or allow arbitrary code execution. Siemens has released patches for V2201 (version 2201.0012) and V2302 (versions 2302.0006 and 2302.0007), but V2201 has no fix available for CVE-2024-23799, 23800, 23801, and 23803. Exploitation requires social engineering to trick a user into opening a hostile file; remote exploitation is not possible.
- User must open a malicious file with Tecnomatix Plant Simulation
- File must be in WRL, PSOBJ, or SPP format
- No special credentials or network access required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fbd1d56c-302a-4663-9754-91dfbdf320caGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.