This could allow an attacker to execute code in the context of the current process.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 23 Sep 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Siemens
Siemens teamcenter Visualization Siemens tecnomatix Plant Simulation |
|
CPEs | cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Siemens
Siemens teamcenter Visualization Siemens tecnomatix Plant Simulation |
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 11 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 11 Mar 2025 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file. This could allow an attacker to execute code in the context of the current process. | |
Weaknesses | CWE-787 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-03-11T13:49:18.776Z
Reserved: 2025-01-15T14:20:46.046Z
Link: CVE-2025-23396

Updated: 2025-03-11T13:49:11.967Z

Status : Analyzed
Published: 2025-03-11T10:15:16.670
Modified: 2025-09-23T15:29:28.730
Link: CVE-2025-23396

No data.

No data.