A vulnerability has been identified in ModelSim (All versions < V2025.1), Questa (All versions < V2025.1). An example setup script contained in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch the script from a user-writable directory.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-637914.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
25 Sep 2025, 13:39
Type | Values Removed | Values Added |
---|---|---|
First Time |
Siemens modelsim
Siemens Siemens questa |
|
CPE | cpe:2.3:a:siemens:questa:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:modelsim:*:*:*:*:*:*:*:* |
|
Summary |
|
|
References | () https://cert-portal.siemens.com/productcert/html/ssa-637914.html - Vendor Advisory |
11 Feb 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-11 11:15
Updated : 2025-09-25 13:39
NVD link : CVE-2024-53977
Mitre link : CVE-2024-53977
CVE.ORG link : CVE-2024-53977
JSON object : View
Products Affected
siemens
- questa
- modelsim
CWE
CWE-427
Uncontrolled Search Path Element