Siemens Tecnomatix Plant Simulation
Siemens Tecnomatix Plant Simulation and Teamcenter Visualization contain an out-of-bounds read vulnerability in WRL (VRML) file parsing. When a user opens a malicious WRL file in an affected product, the application could crash or potentially execute arbitrary code. Affected versions are Teamcenter Visualization V14.3 (before 14.3.0.14), V2312 (before 2312.0010), V2406 (before 2406.0008), V2412 (before 2412.0004), and Tecnomatix Plant Simulation V2404 (before 2404.0013). Siemens has released patched versions for all affected products.
- User must open a malicious WRL file in an affected application
- Attacker must deliver the file to the user (email, file sharing, USB, etc.)
- User must have an affected version installed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cd6d46d4-682e-40ae-96d1-f3820099384bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.