Feb. 15, 2024, 6 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Simcenter Femap. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-24924.

arbitrary code attackers code code execution cvss exploit file malicious out-of-bounds out-of-bounds write page parsing rating remote code remote code execution siemens target vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

C003561 On-line Vulnerability Assessment (OVA) Tool Manager (CTS) - WED 22 May

@ EMW, Inc. | Mons, Wallonia, Belgium

Engineer - IT Security Compliance

@ Tiffany & Co. | Parsippany, NJ, United States

Senior Restricted Research Compliance Specialist

@ University of Cincinnati | Cincinnati, OH, US

Senior Manager of Security Engineering - Employee Compute

@ JPMorgan Chase & Co. | Houston, TX, United States

Incident Response Analyst

@ Verisk | Jersey City, NJ, United States

Application Security Penetration Tester

@ Vodeno | Poland (remote)