CVE-2024-45474

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption when parsing specially crafted WRL files in Siemens Teamcenter Visualization and Tecnomatix Plant Simulation software. An attacker could potentially execute arbitrary code in the context of the current process by exploiting this vulnerability in combination with other flaws. Organizations using affected versions of these Siemens industrial software products are at risk.

💻 Affected Systems

Products:
  • Teamcenter Visualization
  • Tecnomatix Plant Simulation
Versions: Teamcenter Visualization V14.2 (< V14.2.0.14), V14.3 (< V14.3.0.12), V2312 (< V2312.0008); Tecnomatix Plant Simulation V2302 (< V2302.0016), V2404 (< V2404.0005)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable when processing WRL files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or disruption of industrial operations.

🟠

Likely Case

Application crash or denial of service; code execution would require additional vulnerabilities to be chained together.

🟢

If Mitigated

Limited impact with proper file validation and least privilege controls in place.

🌐 Internet-Facing: LOW (These applications are typically deployed internally in industrial environments)
🏢 Internal Only: MEDIUM (Attackers with internal access could exploit via malicious WRL files)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious WRL files; code execution requires chaining with other vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Teamcenter Visualization V14.2.0.14, V14.3.0.12, V2312.0008; Tecnomatix Plant Simulation V2302.0016, V2404.0005

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-583523.html

Restart Required: Yes

Instructions:

1. Download patches from Siemens support portal. 2. Apply patches to affected installations. 3. Restart applications/services. 4. Verify version updates.

🔧 Temporary Workarounds

Restrict WRL file processing

all

Block or restrict processing of WRL files through application settings or file type associations

Implement file validation

all

Use external tools to validate WRL files before processing in affected applications

🧯 If You Can't Patch

  • Restrict user permissions to prevent execution of untrusted WRL files
  • Implement network segmentation to isolate affected systems from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check application version against affected version ranges in vendor advisory

Check Version:

Check application 'About' dialog or consult Siemens documentation for version query commands

Verify Fix Applied:

Verify installed version matches or exceeds patched versions listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing WRL files
  • Unexpected memory access errors in application logs

Network Indicators:

  • Unusual file transfers of WRL files to affected systems

SIEM Query:

Application:Teamcenter OR Application:Tecnomatix AND (EventID:1000 OR EventID:1001) AND FileExtension:wrl

🔗 References

📤 Share & Export