{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-23363","assignerOrgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","state":"PUBLISHED","assignerShortName":"siemens","dateReserved":"2025-01-14T14:01:39.192Z","datePublished":"2025-02-11T10:29:02.933Z","dateUpdated":"2025-06-10T15:17:22.287Z"},"containers":{"cna":{"providerMetadata":{"orgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","shortName":"siemens","dateUpdated":"2025-06-10T15:17:22.287Z"},"descriptions":[{"lang":"en","value":"A vulnerability has been identified in Teamcenter V14.1 (All versions), Teamcenter V14.2 (All versions), Teamcenter V14.3 (All versions < V14.3.0.14), Teamcenter V2312 (All versions < V2312.0010), Teamcenter V2406 (All versions < V2406.0008), Teamcenter V2412 (All versions < V2412.0004). The SSO login service of affected applications accepts user-controlled input that could specify a link to an external site. This could allow an attacker to redirect the legitimate user to an attacker-chosen URL to steal valid session data. For a successful exploit, the legitimate user must actively click on an attacker-crafted link."}],"affected":[{"vendor":"Siemens","product":"Teamcenter V14.1","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Teamcenter V14.2","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Teamcenter V14.3","versions":[{"status":"affected","version":"0","lessThan":"V14.3.0.14","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Teamcenter V2312","versions":[{"status":"affected","version":"0","lessThan":"V2312.0010","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Teamcenter V2406","versions":[{"status":"affected","version":"0","lessThan":"V2406.0008","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Teamcenter V2412","versions":[{"status":"affected","version":"0","lessThan":"V2412.0004","versionType":"custom"}],"defaultStatus":"unknown"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N","baseScore":7.4,"baseSeverity":"HIGH"}},{"cvssV4_0":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:H/SI:N/SA:N","baseScore":6.1,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-601","description":"CWE-601: URL Redirection to Untrusted Site ('Open Redirect')","type":"CWE"}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-656895.html"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-11T16:25:01.651412Z","id":"CVE-2025-23363","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-12T15:50:41.213Z"}}]}}