A critical cross-site scripting (XSS) vulnerability has been identified in PTC Codebeamer, an application lifecycle management platform widely used in various industries, including Information Technology and Critical Manufacturing. The vulnerability, designated as CVE-2024-3951, affects Codebeamer versions 22.10 SP9 and prior, 2.0.0.3 and prior, and 2.1.0.0. Security researcher Marek Holka from ETAS reported this flaw, which allows attackers to inject and execute malicious code. The vulnerability has a CVSS v3.1 base score of 7.1 and a CVSS v4 base score of 5.1, indicating a significant risk level.
Successful exploitation of this vulnerability could enable attackers to inject malicious scripts, potentially compromising the security and integrity of the application. The attack complexity is low, and it can be executed remotely, making it a substantial threat to affected systems. PTC has released updates to address this issue: users should upgrade to Codebeamer version 22.10 SP10 or later, 2.0.0.4 or later, and 2.1.0.1 or later.
The Cybersecurity and Infrastructure Security Agency (CISA) advises organizations to minimize network exposure for all control system devices and isolate them from business networks by using firewalls. Additionally, when remote access is necessary, employing secure methods such as Virtual Private Networks (VPNs) is recommended, although VPNs should also be kept up-to-date.
CISA provides extensive guidance on enhancing industrial control systems cybersecurity, emphasizing the importance of defense-in-depth strategies. Organizations should review CISA’s recommended practices, perform proper impact analysis, and report any suspicious activities to CISA.
No public exploitation of this vulnerability has been reported at this time, but proactive measures are crucial to safeguard systems. For more detailed information and recommendations, users can refer to CISA’s technical information paper and other resources available on their website.
Reference: