OTPulse

Multiple File Parsing Vulnerabilities in Teamcenter Visualization and Tecnomatix Plant Simulation

Plan Patch7.8SSA-050438Mar 11, 2025
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Multiple file parsing vulnerabilities exist in Siemens Teamcenter Visualization (versions 14.3, 2312, 2406, 2412) and Tecnomatix Plant Simulation (versions 2302, 2404) when processing WRL (Virtual Reality Markup Language) files. These vulnerabilities include buffer overflow (CWE-787, CWE-119), out-of-bounds read (CWE-125), and use-after-free (CWE-416) conditions that can be triggered by opening a specially crafted WRL file. Successful exploitation could cause application crash or arbitrary code execution with user privileges.

What this means
What could happen
An attacker could craft a malicious WRL (Virtual Reality Markup Language) file that, when opened by a user in Teamcenter Visualization or Tecnomatix Plant Simulation, causes the application to crash or executes arbitrary code on the engineering workstation. This could disrupt design and simulation work or compromise the integrity of plant models and process documentation.
Who's at risk
Engineering and plant design teams using Siemens Teamcenter Visualization or Tecnomatix Plant Simulation for CAD modeling, visualization, and process simulation. This affects organizations in manufacturing, automotive, aerospace, and utilities that rely on these tools for design review, plant layout, and simulation work.
How it could be exploited
An attacker sends a malicious WRL file to an engineer or plant designer, either via email, file sharing, or by compromising a shared file repository. When the user opens the file in Teamcenter Visualization or Tecnomatix Plant Simulation, the application's file parser processes the malformed WRL content and triggers a memory corruption vulnerability (buffer overflow or use-after-free). This could crash the application or allow code execution with the privileges of the user running the application.
Prerequisites
  • User interaction required: engineer or plant designer must open a malicious WRL file
  • File must be in WRL format recognized by the affected application
  • User must be running a vulnerable version of Teamcenter Visualization or Tecnomatix Plant Simulation
user interaction requiredlow complexity exploitationaffects engineering workstationscould lead to code execution
Exploitability
Low exploit probability (EPSS 0.0%)
Affected products (6)
6 with fix
ProductAffected VersionsFix Status
Teamcenter Visualization V14.3< V14.3.0.1314.3.0.13
Teamcenter Visualization V2312< V2312.00092312.0009
Teamcenter Visualization V2406< V2406.00072406.0007
Teamcenter Visualization V2412< V2412.00022412.0002
Tecnomatix Plant Simulation V2302< V2302.00212302.0021
Tecnomatix Plant Simulation V2404< V2404.00102404.0010
Remediation & Mitigation
0/8
Do now
0/2
HARDENINGInstruct users not to open WRL files from untrusted sources without verification
WORKAROUNDDisable automatic file association with WRL files if not required for operations
Schedule — requires maintenance window
0/6

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Teamcenter Visualization to version 14.3.0.13 or later
HOTFIXUpdate Teamcenter Visualization to version 2312.0009 or later
HOTFIXUpdate Teamcenter Visualization to version 2406.0007 or later
HOTFIXUpdate Teamcenter Visualization to version 2412.0002 or later
HOTFIXUpdate Tecnomatix Plant Simulation to version 2302.0021 or later
HOTFIXUpdate Tecnomatix Plant Simulation to version 2404.0010 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/b2c8f47d-723d-4230-a5f9-8dc898ea063a
Multiple File Parsing Vulnerabilities in Teamcenter Visualization and Tecnomatix Plant Simulation | CVSS 7.8 - OTPulse