OTPulse

Hard Coded Default Credential Vulnerability in Teamcenter

Act Now9.9SSA-220589Jun 14, 2022
Attack VectorNetwork
Auth RequiredLow
ComplexityLow
User InteractionNone needed
Summary

Siemens Teamcenter contains a vulnerability related to insecure storage of user credentials in the Java EE Server Manager HTML Adapter. An authenticated attacker could exploit this to gain unauthorized access or escalate privileges. The Java EE Server Manager is not installed by default and has been obsoleted by Siemens. The vulnerability is fixed in: Teamcenter V12.4.0.13, V13.0.0.9, V13.1.0.9, V13.2.0.9, V13.3.0.3, and V14.0.0.2 or later versions.

What this means
What could happen
An attacker with valid Teamcenter user credentials could exploit this vulnerability to gain unauthorized access to the Java EE Server Manager with elevated privileges, potentially allowing them to modify engineering data, process definitions, or access sensitive manufacturing information stored in Teamcenter.
Who's at risk
Organizations using Siemens Teamcenter for product lifecycle management (PLM), engineering data management, or manufacturing process documentation, particularly those who have installed the Java EE Server Manager HTML Adapter (which is non-default and obsoleted). This affects manufacturing plants, automotive suppliers, industrial equipment designers, and any enterprise using Teamcenter for digital manufacturing workflows.
How it could be exploited
An attacker who has obtained valid Teamcenter user credentials (through phishing, credential reuse, or another compromise) can authenticate to the Java EE Server Manager HTML Adapter and use hardcoded credentials to escalate privileges or access administrative functions. The vulnerability requires the Java EE Server Manager HTML Adapter to be installed and accessible on the network, which is not the default configuration.
Prerequisites
  • Valid Teamcenter user credentials
  • Java EE Server Manager HTML Adapter must be installed (non-default)
  • Network access to the Server Manager interface on the affected Teamcenter instance
Hardcoded credentialsRequires valid user credentials to exploitJava EE Server Manager HTML Adapter is obsoleted but may exist in legacy installationsCVSS 9.9 severityAllows privilege escalation with valid credentials
Exploitability
Moderate exploit probability (EPSS 1.2%)
Affected products (6)
6 with fix
ProductAffected VersionsFix Status
Teamcenter V12.4< V12.4.0.1312.4.0.13
Teamcenter V13.0< V13.0.0.913.0.0.9
Teamcenter V13.1< V13.1.0.913.1.0.9
Teamcenter V13.2< V13.2.0.913.2.0.9
Teamcenter V13.3< V13.3.0.313.3.0.3
Teamcenter V14.0< V14.0.0.214.0.0.2
Remediation & Mitigation
0/8
Do now
0/2
WORKAROUNDIf Java EE Server Manager HTML Adapter is not required for operations, disable or uninstall the service to eliminate the attack surface
HARDENINGRestrict network access to the Java EE Server Manager interface using firewall rules; limit access to authorized engineering workstations only
Schedule — requires maintenance window
0/6

Patching may require device reboot — plan for process interruption

Teamcenter V12.4
HOTFIXUpdate Teamcenter V12.4 to version 12.4.0.13 or later
Teamcenter V13.0
HOTFIXUpdate Teamcenter V13.0 to version 13.0.0.9 or later
Teamcenter V13.1
HOTFIXUpdate Teamcenter V13.1 to version 13.1.0.9 or later
Teamcenter V13.2
HOTFIXUpdate Teamcenter V13.2 to version 13.2.0.9 or later
Teamcenter V13.3
HOTFIXUpdate Teamcenter V13.3 to version 13.3.0.3 or later
Teamcenter V14.0
HOTFIXUpdate Teamcenter V14.0 to version 14.0.0.2 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/c9f4e039-2f13-454c-9b9f-90ea96ca206f