PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-33893 Cert Portal CVE debrief

CVE-2026-33893 is a high-severity Siemens Teamcenter issue in which a hardcoded obfuscation key is stored directly in the application. If an attacker extracts that key, it could be reused to gain unauthorized access. The advisory was published on 2026-05-12 and republished by CISA on 2026-05-14, with vendor fixes listed for affected Teamcenter branches.

Vendor
Cert Portal
Product
Siemens Teamcenter V2312 vers:intdot/<2312.0014 vers:intdot/<2312.0009 Teamcenter V2406 vers:intdot/<2406.0012 vers:intdot/<2406.0006 Teamcenter V2412 vers:intdot/<2412.0009 Teamcenter V2506 vers:intdot/<2506.0005 Teamcenter V2512 vers:all/*
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-12
Original CVE updated
2026-05-14
Advisory published
2026-05-12
Advisory updated
2026-05-14

Who should care

Siemens Teamcenter administrators, product security teams, and defenders responsible for environments that run the affected Teamcenter releases.

Technical summary

CISA's advisory states that the application contains a hardcoded key used for obfuscation and stored directly in the application. The supplied CVSS 3.1 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, which indicates a network-reachable issue requiring no privileges or user interaction, with primary impact to confidentiality. The advisory lists fixed releases for Teamcenter V2312, V2406, V2412, and V2506.

Defensive priority

High

Recommended defensive actions

  • Upgrade affected Siemens Teamcenter deployments to the fixed release listed for your branch: V2312.0014 or later, V2406.0012 or later, V2412.0009 or later, or V2506.0005 or later.
  • Inventory Teamcenter versions across all environments and confirm which instances match the affected branches named in the advisory.
  • Until patched, limit exposure of Teamcenter services to trusted networks and accounts, following standard defense-in-depth and least-privilege practices.
  • Review the Siemens ProductCERT and CISA advisory references for any branch-specific guidance before scheduling maintenance windows.

Evidence notes

Primary evidence comes from CISA CSAF advisory ICSA-26-134-04, which republishes Siemens ProductCERT advisory SSA-827383. The supplied corpus gives a publish date of 2026-05-12 and a CISA republication date of 2026-05-14. The technical description is limited to a hardcoded obfuscation key and possible unauthorized access; no exploit details are provided, and no Known Exploited Vulnerability entry is listed.

Official resources

Publicly disclosed through CISA ICS Advisory ICSA-26-134-04 on 2026-05-12, with CISA's republication of Siemens ProductCERT advisory SSA-827383 on 2026-05-14.