Modelsim Siemens Modelsim

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Siemens Modelsim.

By the Year

In 2026 there have been 0 vulnerabilities in Siemens Modelsim. Modelsim did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 3 7.30
2023 0 0.00
2022 0 0.00
2021 1 6.50

It may take a day or so for new Modelsim vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Siemens Modelsim Security Vulnerabilities

ModelSim/Questa vsimk.exe Auth Code Exec via Tcl Load (pre-V2025.2)
CVE-2024-47196 7.3 - High - October 08, 2024

A vulnerability has been identified in ModelSim (All versions < V2025.2), Questa (All versions < V2025.2). vsimk.exe in affected applications allows a specific tcl file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vsimk.exe from a user-writable directory.

DLL preloading

ModelSim/Questa gdb.exe Auth CnC Vulnerability (pre2024.3)
CVE-2024-47195 7.3 - High - October 08, 2024

A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). gdb.exe in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch gdb.exe from a user-writable directory.

DLL preloading

Local Privilege Escalation via DLL in vish2.exe (ModelSim/Questa < V2024.3)
CVE-2024-47194 7.3 - High - October 08, 2024

A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). vish2.exe in affected applications allows a specific DLL file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch vish2.exe from a user-writable directory.

DLL preloading

A vulnerability has been identified in ModelSim Simulation (All versions), Questa Simulation (All versions)
CVE-2021-42023 6.5 - Medium - December 14, 2021

A vulnerability has been identified in ModelSim Simulation (All versions), Questa Simulation (All versions). The RSA white-box implementation in affected applications insufficiently protects the built-in private keys that are required to decrypt electronic intellectual property (IP) data in accordance with the IEEE 1735 recommended practice. This could allow a sophisticated attacker to discover the keys, bypassing the protection intended by the IEEE 1735 recommended practice.

Insufficiently Protected Credentials

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Siemens Modelsim or by Siemens? Click the Watch button to subscribe.

Siemens
Vendor

subscribe