A vulnerability has been identified in ModelSim (All versions < V2025.1), Questa (All versions < V2025.1). An example setup script contained in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch the script from a user-writable directory.
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/html/ssa-637914.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
25 Sep 2025, 13:39
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Siemens modelsim
Siemens Siemens questa |
|
| References | () https://cert-portal.siemens.com/productcert/html/ssa-637914.html - Vendor Advisory | |
| CPE | cpe:2.3:a:siemens:modelsim:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:questa:*:*:*:*:*:*:*:* |
11 Feb 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-11 11:15
Updated : 2025-09-25 13:39
NVD link : CVE-2024-53977
Mitre link : CVE-2024-53977
CVE.ORG link : CVE-2024-53977
JSON object : View
Products Affected
siemens
- modelsim
- questa
CWE
CWE-427
Uncontrolled Search Path Element
