CVE-2025-40801 PUBLISHED CVSS 8.100000381469727 HIGH

A vulnerability has been identified in COMOS V10.6 (All versions < V10.6.1), COMOS V10.6 (All versions < V10.6.1), JT Bi-Directional Translator for STEP (All versions), NX V2412 (All versions < V2412.8900 with Cloud Entitlement (bundled as NX X)), NX V2506 (All versions < V2506.6000 with Cloud Entitlement (bundled as NX X)), Simcenter 3D (All versions < V2506.6000 with Cloud Entitlement (bundled as Simcenter X Mechanical)), Simcenter Femap (All versions < V2506.0002 with Cloud Entitlement (bundled as Simcenter X Mechanical)), Simcenter Studio (All versions < V2506.0001), Simcenter System Architect (All versions < V2506.0001), Tecnomatix Plant Simulation (All versions < V2504.0007). The SALT SDK is missing server certificate validation while establishing TLS connections to the authorization server. This could allow an attacker to perform a man-in-the-middle attack.

EPSS 0.03% · 8.6th percentile

Risk Scores

CVSS v3.1
8.100000381469727
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score
0.03%
8.6th percentile

Affected Products

VendorProductVersions
SiemensSimcenter Femap0
SiemensJT Bi-Directional Translator for STEP0
SiemensSimcenter 3D0
SiemensSimcenter Studio0
SiemensCOMOS V10.60, 0
SiemensNX V25060
SiemensTecnomatix Plant Simulation0
SiemensNX V24120
SiemensSimcenter System Architect0

Timeline

References

Open in Interactive Console →