A vulnerability has been identified in ModelSim (All versions < V2025.1), Questa (All versions < V2025.1). An example setup script contained in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch the script from a user-writable directory.
                
            References
                    | Link | Resource | 
|---|---|
| https://cert-portal.siemens.com/productcert/html/ssa-637914.html | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    25 Sep 2025, 13:39
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:siemens:questa:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:modelsim:*:*:*:*:*:*:*:* | |
| References | () https://cert-portal.siemens.com/productcert/html/ssa-637914.html - Vendor Advisory | |
| First Time | Siemens Siemens questa Siemens modelsim | |
| Summary | 
 | 
11 Feb 2025, 11:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-11 11:15
Updated : 2025-09-25 13:39
NVD link : CVE-2024-53977
Mitre link : CVE-2024-53977
CVE.ORG link : CVE-2024-53977
JSON object : View
Products Affected
                siemens
- modelsim
- questa
CWE
                
                    
                        
                        CWE-427
                        
            Uncontrolled Search Path Element
