Command Injection and Denial of Service Vulnerability in Teamcenter
Plan Patch7.6SSA-759952Aug 9, 2022
Attack VectorNetwork
Auth RequiredHigh
ComplexityHigh
User InteractionRequired
Summary
Teamcenter versions 12.4 through 14.0 contain command injection and denial of service vulnerabilities in the File Service Cache service. These flaws could allow a high-privilege attacker to execute arbitrary commands on the server or disrupt cache service availability, impacting access to design and manufacturing data. Siemens has released security updates for all affected versions.
What this means
What could happen
An attacker with high-privilege access to Teamcenter could inject commands into the File Service Cache or cause it to stop responding, potentially disrupting access to critical design and manufacturing data in product lifecycle management workflows.
Who's at risk
Manufacturing and product development teams using Teamcenter for design and lifecycle management, particularly those running legacy versions (V12.4 through V13.3). This affects engineering workstations, PLM administrators, and any personnel with high-privilege access to the design repository.
How it could be exploited
An attacker with high-privilege credentials (likely an engineering account or administrator) could exploit command injection in the File Service Cache to execute arbitrary system commands on the Teamcenter server, or trigger a denial of service condition that makes the cache unresponsive and blocks file access for design and manufacturing teams.
Prerequisites
- High-privilege user credentials (engineering or administrator account)
- Network access to Teamcenter server or File Service Cache component
- User interaction required (as indicated by CVSS UI:R)
- Complex exploitation conditions (CVSS AC:H)
High privilege required for exploitationUser interaction neededComplex attack conditionsRemote network access possibleAffects data integrity and availability of critical design files
Exploitability
Low exploit probability (EPSS 0.9%)
Affected products (6)
6 with fix
ProductAffected VersionsFix Status
Teamcenter V12.4< V12.4.0.1512.4.0.15
Teamcenter V13.0< V13.0.0.1013.0.0.10
Teamcenter V13.1< V13.1.0.1013.1.0.10
Teamcenter V13.2< V13.2.0.913.2.0.9
Teamcenter V13.3< V13.3.0.513.3.0.5
Teamcenter V14.0< V14.0.0.214.0.0.2
Remediation & Mitigation
0/7
Schedule — requires maintenance window
0/5Patching may require device reboot — plan for process interruption
Teamcenter V12.4
HOTFIXUpdate Teamcenter V12.4 to version 12.4.0.15 or later
Teamcenter V13.0
HOTFIXUpdate Teamcenter V13.0 to version 13.0.0.10 or later
Teamcenter V13.1
HOTFIXUpdate Teamcenter V13.1 to version 13.1.0.10 or later
Teamcenter V13.2
HOTFIXUpdate Teamcenter V13.2 to version 13.2.0.9 or later
Teamcenter V13.3
HOTFIXUpdate Teamcenter V13.3 to version 13.3.0.5 or later
Long-term hardening
0/2HARDENINGRestrict administrative access to Teamcenter to a minimal set of trusted users and engineering personnel
HARDENINGMonitor File Service Cache logs for unexpected command execution or service disruptions
CVEs (2)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/6c109c5e-6d0f-4bf5-9f3e-7bdf96757058