Multiple vulnerabilities in Siemens Tecnomatix Plant Simulation



Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2025-25266
CVE-2025-25267
CWE-ID CWE-552
Exploitation vector Local
Public exploit N/A
Vulnerable software
Tecnomatix Plant Simulation
Server applications / SCADA systems

Vendor Siemens

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Files or Directories Accessible to External Parties

EUVDB-ID: #VU105633

Risk: Low

CVSSv4.0: 4.6 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-25266

CWE-ID: CWE-552 - Files or Directories Accessible to External Parties

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to the affected application does not properly restrict access to the file deletion functionality. A local attacker can deletee files on the system, leading to data loss or unauthorized modification of system files.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Tecnomatix Plant Simulation: before 2302.0021

CPE2.3 External links

https://cert-portal.siemens.com/productcert/html/ssa-507653.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Files or Directories Accessible to External Parties

EUVDB-ID: #VU105634

Risk: Low

CVSSv4.0: 4.6 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-25267

CWE-ID: CWE-552 - Files or Directories Accessible to External Parties

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to the affected application does not properly restrict the scope of files accessible to the simulation model. A local attacker can gain access to sensitive information o nthe system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Tecnomatix Plant Simulation: before 2302.0021

CPE2.3 External links

https://cert-portal.siemens.com/productcert/html/ssa-507653.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###