This could allow an attacker to execute code in the context of the current process.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 23 Sep 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Siemens
Siemens teamcenter Visualization Siemens tecnomatix Plant Simulation |
|
CPEs | cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Siemens
Siemens teamcenter Visualization Siemens tecnomatix Plant Simulation |
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 11 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 11 Mar 2025 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. | |
Weaknesses | CWE-125 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-03-11T15:05:09.830Z
Reserved: 2025-01-15T14:20:46.047Z
Link: CVE-2025-23399

Updated: 2025-03-11T15:05:06.827Z

Status : Analyzed
Published: 2025-03-11T10:15:17.170
Modified: 2025-09-23T15:28:58.983
Link: CVE-2025-23399

No data.

No data.