Nov. 14, 2023, 6 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-38071.

arbitrary code attackers buffer buffer overflow code code execution cvss exploit file malicious overflow page parsing remote code remote code execution siemens simulation target vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Paid internship - Cybersecurity [BGSW]

@ Bosch Group | Warszawa, Poland

Cybersecurity Officer

@ People In Need | Prague 2, Prague, Czechia

University -Cybersecurity Consultant

@ Booz Allen Hamilton | USA, CA, San Diego (1615 Murray Canyon Rd)

Senior Security Engineer, Detection Engineering

@ Lyft | Seattle, WA

Architecte de la sécurité des applications / Application Security Architect

@ Genetec | Montreal, Quebec, Canada

Telecommunications Sector| SIEM Engineer

@ Devoteam | Lisbon, Portugal