OTPulse

Siemens Teamcenter Visualization and Tecnomatix

Plan Patch7.8ICS-CERT ICSA-25-072-01Mar 11, 2025
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Siemens Teamcenter Visualization and Tecnomatix Plant Simulation contain multiple file parsing vulnerabilities in WRL (VRML) file handling. The vulnerabilities are triggered when the application reads a malicious WRL file and could cause the application to crash or lead to arbitrary code execution. The vulnerabilities affect Teamcenter Visualization versions 14.3, 2312, 2406, and 2412, as well as Tecnomatix Plant Simulation versions 2302 and 2404. Siemens has released updated versions for all affected products.

What this means
What could happen
An attacker who tricks a user into opening a malicious WRL file in Teamcenter Visualization or Tecnomatix Plant Simulation could crash the application, causing loss of visualization or simulation capabilities, or potentially execute arbitrary code on the engineering workstation.
Who's at risk
Engineering teams and design departments that use Siemens Teamcenter Visualization or Tecnomatix Plant Simulation for 3D visualization and manufacturing simulation. This includes automotive, aerospace, machinery, and process engineering organizations that rely on these tools for design review, simulation, and planning.
How it could be exploited
An attacker crafts a malicious WRL (VRML) file and sends it to an engineer or designer via email, file sharing, or a compromised repository. When the user opens the file in a vulnerable version of Teamcenter Visualization or Tecnomatix Plant Simulation, the application parses the malicious file, triggering a buffer overflow or memory corruption vulnerability that crashes the application or executes code with the user's privileges.
Prerequisites
  • User must open a malicious WRL file in the affected application
  • User must have Teamcenter Visualization or Tecnomatix Plant Simulation installed
  • Vulnerable version must be in use
Local code execution possibleRequires user interaction (file open)Memory corruption vulnerabilities (buffer overflow)Affects engineering workstations and design tools
Exploitability
Low exploit probability (EPSS 0.0%)
Affected products (6)
6 with fix
ProductAffected VersionsFix Status
Teamcenter Visualization V14.3<V14.3.0.1314.3.0.13
Teamcenter Visualization V2312<V2312.00092312.0009
Teamcenter Visualization V2406<V2406.00072406.0007
Teamcenter Visualization V2412<V2412.00022412.0002
Tecnomatix Plant Simulation V2302<V2302.00212302.0021
Tecnomatix Plant Simulation V2404<V2404.00102404.0010
Remediation & Mitigation
0/8
Do now
0/1
WORKAROUNDInstruct users not to open WRL files from untrusted sources; implement email filters to block or quarantine WRL file attachments from external senders
Schedule — requires maintenance window
0/6

Patching may require device reboot — plan for process interruption

Teamcenter Visualization V14.3
HOTFIXUpdate Teamcenter Visualization V14.3 to version 14.3.0.13 or later
Teamcenter Visualization V2312
HOTFIXUpdate Teamcenter Visualization V2312 to version 2312.0009 or later
Teamcenter Visualization V2406
HOTFIXUpdate Teamcenter Visualization V2406 to version 2406.0007 or later
Teamcenter Visualization V2412
HOTFIXUpdate Teamcenter Visualization V2412 to version 2412.0002 or later
Tecnomatix Plant Simulation V2302
HOTFIXUpdate Tecnomatix Plant Simulation V2302 to version 2302.0021 or later
Tecnomatix Plant Simulation V2404
HOTFIXUpdate Tecnomatix Plant Simulation V2404 to version 2404.0010 or later
Long-term hardening
0/1
HARDENINGRestrict file sharing access and require file transfers through vetted, internal channels only
↑↓ Navigate · Esc Close
API: /api/v1/advisories/d7072616-ffe2-4060-a52b-c0281f014bab
Siemens Teamcenter Visualization and Tecnomatix | CVSS 7.8 - OTPulse