This could allow an attacker to execute arbitrary code with administrative privileges by placing a malicious executable in the same directory.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-10332 | A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affected application searches for executable files in the application folder without proper validation. This could allow an attacker to execute arbitrary code with administrative privileges by placing a malicious executable in the same directory. |
Wed, 09 Apr 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Apr 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affected application searches for executable files in the application folder without proper validation. This could allow an attacker to execute arbitrary code with administrative privileges by placing a malicious executable in the same directory. | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-04-08T13:26:14.840Z
Reserved: 2025-03-13T14:30:18.938Z
Link: CVE-2025-29999
Updated: 2025-04-08T13:25:57.861Z
Status : Deferred
Published: 2025-04-08T09:15:27.053
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-29999
No data.
OpenCVE Enrichment
No data.
EUVD