CISA and BSI warn orgs of critical PTC Windchill and FlexPLM flaw
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章内容,抓住关键点。 文章标题是CISA和BSI警告组织有关PTC Windchill和FlexPLM的严重漏洞。内容提到CISA警告了一个关键漏洞CVE-2026-4681,CVSS评分10分,属于RCE问题,可能被利用。目前没有补丁,可能被立即利用。德国警方甚至半夜上门警告企业。 接下来,我需要将这些信息浓缩到100字以内。重点包括:CISA和BSI警告、PTC软件的漏洞、CVSS 10分、RCE风险、无补丁、可能被利用、德国警方行动。 现在组织语言:CISA和BSI警告PTC Windchill和FlexPLM软件存在严重漏洞(CVE-2026-4681),CVSS评分10分,可能导致远程代码执行。目前无补丁,可能被立即利用。德国警方甚至在夜间访问企业进行警告。 检查字数:大约在95字左右,符合要求。 </think> CISA和BSI警告PTC Windchill和FlexPLM软件存在严重漏洞(CVE-2026-4681),CVSS评分10分,可能导致远程代码执行。目前无补丁可用,可能被立即利用。德国警方甚至在夜间访问企业进行警告。 2026-3-27 14:58:30 Author: securityaffairs.com(查看原文) 阅读量:2 收藏

CISA and BSI warn orgs of critical PTC Windchill and FlexPLM flaw

CISA warns of a critical flaw in PTC Windchill and FlexPLM (CVE-2026-4681), with no patch yet and potential for imminent exploitation.

CISA issued an advisory about a critical vulnerability, tracked as CVE-2026-4681 (CVSS score of 10.0), in PTC’s Windchill and FlexPLM software. At this time, no patches are available, and no active attacks have been confirmed, but German media outlet Heise suggests exploitation could be imminent. Organizations are urged to stay alert and apply mitigations while awaiting updates.

“The vulnerability is a Remote Code Execution (RCE) issue that may be exploited through deserialization of untrusted data” reads the advisory by the vendor, which includes mitigations and indicators of compromise (IoCs).

PTC FlexPLM is a software solution for Product Lifecycle Management (PLM) that helps companies manage product data and processes. PTC Windchill is a product lifecycle management software that helps companies manage product data and processes throughout the entire product lifecycle.

An anonymous source reported the vulnerability to CISA

The critical vulnerability triggered an unprecedented response in Germany, where police, acting on instructions from the Federal Criminal Police Office (BKA), physically visited companies, sometimes in the middle of the night, to warn them.

“The officers handed over a copy of the letter to the sleepy administrators, which manufacturer PTC had already sent to all customers the day before and which contained instructions for a hotfix. An affected party reports: “The police were at our door at 3:30 AM.” states the Hense.”A production employee then informed the managing director, who informed me or a colleague.” He wonders about the urgency of the action: “Our servers are only accessible internally and cannot communicate with the WAN. The number of authorized clients is also severely restricted (different VLAN).””

Many administrators were surprised or irritated, especially since some did not use the affected products or had systems not exposed to external networks.

The goal was to ensure rapid awareness and mitigation, even though PTC had already notified customers. The large-scale operation, involving hundreds or even thousands of companies, is highly unusual, particularly as major cybersecurity agencies had not issued strong public alerts.

Adding confusion, PTC stated there is no evidence of active exploitation, yet released specific indicators of compromise suggesting attackers may already have weaponized the flaw. At the time, no patches were available, increasing concern about potential risks.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CISA)




文章来源: https://securityaffairs.com/190049/security/cisa-and-bsi-warn-orgs-of-critical-ptc-windchill-and-flexplm-flaw.html
如有侵权请联系:admin#unsafe.sh