CVE-2024-45464

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted WRL files in Siemens Teamcenter Visualization and Tecnomatix Plant Simulation software. An attacker could execute arbitrary code in the context of the current process by exploiting an out-of-bounds read vulnerability. Organizations using affected versions of these Siemens industrial software products are at risk.

💻 Affected Systems

Products:
  • Teamcenter Visualization
  • Tecnomatix Plant Simulation
Versions: Teamcenter Visualization V14.2 (< V14.2.0.14), V14.3 (< V14.3.0.12), V2312 (< V2312.0008); Tecnomatix Plant Simulation V2302 (< V2302.0016), V2404 (< V2404.0005)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with default configurations are vulnerable when processing WRL files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the application process, potentially leading to data theft, system manipulation, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or remote code execution when users open malicious WRL files, potentially compromising individual workstations.

🟢

If Mitigated

Limited impact with proper file validation and user awareness preventing malicious file execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious WRL files. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Teamcenter Visualization V14.2.0.14, V14.3.0.12, V2312.0008; Tecnomatix Plant Simulation V2302.0016, V2404.0005

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-583523.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Siemens support portal. 2. Backup current installation. 3. Run the patch installer with administrative privileges. 4. Restart the application and verify the patch is applied.

🔧 Temporary Workarounds

Block WRL file extensions

all

Prevent execution of WRL files through application whitelisting or file blocking

User awareness training

all

Train users not to open WRL files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized execution of Teamcenter Visualization and Tecnomatix Plant Simulation
  • Use network segmentation to isolate affected systems from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check the installed version against affected version ranges in the Siemens advisory

Check Version:

Check Help > About in the application interface or consult Siemens documentation for version checking

Verify Fix Applied:

Verify the installed version matches or exceeds the patched versions listed in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing WRL files
  • Unusual process creation from Teamcenter Visualization or Tecnomatix Plant Simulation

Network Indicators:

  • Unexpected outbound connections from affected applications
  • File transfers of WRL files to vulnerable systems

SIEM Query:

Process creation events from 'Teamcenter Visualization' or 'Tecnomatix Plant Simulation' followed by suspicious network connections

🔗 References

📤 Share & Export