May 17, 2024, 5 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Simcenter Femap. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-32061.

arbitrary code attackers code code execution cvss exploit file malicious out-of-bounds page parsing rating remote code remote code execution siemens target vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Information Technology Specialist I, LACERA: Information Security Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA

Manager Pentest H/F

@ Hifield | Sèvres, France

Information System Security Officer

@ Parsons Corporation | USA VA Chantilly (Client Site)

Vulnerability Analyst, Mid

@ Booz Allen Hamilton | USA, VA, McLean (8283 Greensboro Dr, Hamilton)

SAP Security and Compliance Auditor

@ Bosch Group | Warszawa, Poland

Head of Product Security (Business team)

@ Zalando | Berlin