A vulnerability has been identified in ModelSim (All versions < V2025.2), Questa (All versions < V2025.2). vsimk.exe in affected applications allows a specific tcl file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vsimk.exe from a user-writable directory.
History

Tue, 17 Jun 2025 08:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). vsimk.exe in affected applications allows a specific tcl file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vsimk.exe from a user-writable directory. A vulnerability has been identified in ModelSim (All versions < V2025.2), Questa (All versions < V2025.2). vsimk.exe in affected applications allows a specific tcl file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vsimk.exe from a user-writable directory.

Tue, 08 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Siemens
Siemens modelsim
Siemens questa
CPEs cpe:2.3:a:siemens:modelsim:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:questa:*:*:*:*:*:*:*:*
Vendors & Products Siemens
Siemens modelsim
Siemens questa
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 08 Oct 2024 09:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). vsimk.exe in affected applications allows a specific tcl file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vsimk.exe from a user-writable directory.
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published: 2024-10-08T08:40:49.065Z

Updated: 2025-06-17T08:11:22.933Z

Reserved: 2024-09-20T15:14:29.689Z

Link: CVE-2024-47196

cve-icon Vulnrichment

Updated: 2024-10-08T16:49:48.286Z

cve-icon NVD

Status : Modified

Published: 2024-10-08T09:15:17.563

Modified: 2025-06-17T09:15:22.873

Link: CVE-2024-47196

cve-icon Redhat

No data.