Impact
The vulnerability arises from the presence of a hard‑coded key within Siemens Teamcenter applications. This key is embedded in the application binary and can be extracted by an attacker who has read access to the binary or memory. With the key in hand, an attacker can potentially authenticate or manipulate data, granting unauthorized access to the system. The flaw is classified as an authentication weakness (CWE‑798) and is rated high severity with a CVSS of 8.7.
Affected Systems
Siemens Teamcenter versions V2312, V2406, V2412, V2506 and the entire V2512 series are impacted. Versions older than V2312.0014, V2406.0012, V2412.0009 and V2506.0005 contain the vulnerable implementation.
Risk and Exploitability
No EPSS score is available, but the CVSS of 8.7 indicates that exploitation could lead to unauthorized access or privilege escalation. The vulnerability is not listed in the CISA KEV catalog, suggesting that public exploits have not been observed yet. Based on the description, it is inferred that an attacker could extract the hard‑coded key from the application binary; remote exploitation would require code execution or privilege within the environment.
OpenCVE Enrichment