CVE-2025-40801

CRITICAL
中文标题:
(暂无数据)
英文标题:
A vulnerability has been identified in COMOS V10.6 (All versions), COMOS V10.6 (All versions), JT Bi...
CVSS分数: 9.2
发布时间: 2025-12-09 10:44:24
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v2
漏洞描述
中文描述:

(暂无数据)

英文描述:

A vulnerability has been identified in COMOS V10.6 (All versions), COMOS V10.6 (All versions), JT Bi-Directional Translator for STEP (All versions), NX V2412 (All versions < V2412.8900 with Cloud Entitlement (bundled as NX X)), NX V2506 (All versions < V2506.6000 with Cloud Entitlement (bundled as NX X)), Simcenter 3D (All versions < V2506.6000 with Cloud Entitlement (bundled as Simcenter X Mechanical)), Simcenter Femap (All versions < V2506.0002 with Cloud Entitlement (bundled as Simcenter X Mechanical)), Simcenter Studio (All versions), Simcenter System Architect (All versions), Tecnomatix Plant Simulation (All versions < V2504.0007). The SALT SDK is missing server certificate validation while establishing TLS connections to the authorization server. This could allow an attacker to perform a man-in-the-middle attack.

CWE类型:
CWE-295
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Siemens COMOS V10.6 - < * - cpe:2.3:a:siemens:comos_v10.6:*:*:*:*:*:*:*:*
Siemens JT Bi-Directional Translator for STEP - < * - cpe:2.3:a:siemens:jt_bi-directional_translator_for_step:*:*:*:*:*:*:*:*
Siemens NX V2412 - < V2412.8900 - cpe:2.3:a:siemens:nx_v2412:*:*:*:*:*:*:*:*
Siemens NX V2506 - < V2506.6000 - cpe:2.3:a:siemens:nx_v2506:*:*:*:*:*:*:*:*
Siemens Simcenter 3D - < V2506.6000 - cpe:2.3:a:siemens:simcenter_3d:*:*:*:*:*:*:*:*
Siemens Simcenter Femap - < V2506.0002 - cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*
Siemens Simcenter Studio - < * - cpe:2.3:a:siemens:simcenter_studio:*:*:*:*:*:*:*:*
Siemens Simcenter System Architect - < * - cpe:2.3:a:siemens:simcenter_system_architect:*:*:*:*:*:*:*:*
Siemens Tecnomatix Plant Simulation - < V2504.0007 - cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
CVSS评分详情
3.1 (cna)
HIGH
8.1
CVSS向量: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
4.0 (cna)
CRITICAL
9.2
CVSS向量: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
机密性
HIGH
完整性
HIGH
可用性
HIGH
后续系统影响 (Subsequent):
机密性
NONE
完整性
NONE
可用性
NONE
时间信息
发布时间:
2025-12-09 10:44:24
修改时间:
2025-12-09 14:26:55
创建时间:
2026-01-12 02:11:48
更新时间:
2026-01-12 02:27:47
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-40801 2025-12-11 03:30:33 2026-01-12 02:11:48
NVD nvd_CVE-2025-40801 2025-12-10 04:21:17 2026-01-12 02:27:47
版本与语言
当前版本: v2
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v2 NVD
2026-01-12 02:27:47
affected_products_count: 10 → 9; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 10 -> 9
  • data_sources: ['cve'] -> ['cve', 'nvd']