PTC warns of imminent threat from critical Windchill, FlexPLM RCE bug
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读这篇文章,理解它的主要内容。 文章主要讲PTC公司警告Windchill和FlexPLM这两个广泛使用的PLM软件存在一个关键漏洞,编号是CVE-2026-4681。这个漏洞可能导致远程代码执行。德国联邦警察已经介入,紧急通知受影响的公司。目前还没有官方补丁,PTC正在开发中。建议管理员应用特定的规则来阻止访问,并且如果无法缓解的话,可能需要断开网络或者关闭服务。 接下来,我需要把这些信息浓缩到100字以内。重点包括:PTC警告漏洞、影响范围、远程代码执行的风险、德国警方的行动、补丁情况以及缓解措施。 然后,我要确保语言简洁明了,不使用复杂的术语,让用户一目了然。同时,不需要用“文章内容总结”这样的开头,直接描述即可。 最后检查一下字数是否符合要求,并且信息准确无误。 </think> PTC警告Windchill和FlexPLM存在关键漏洞(CVE-2026-4681),可能引发远程代码执行。德国警方已采取紧急行动通知企业。官方补丁尚未发布,建议管理员应用特定规则阻止访问,并在必要时断开网络或关闭服务以缓解风险。 2026-3-24 23:15:15 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

PTC warns of imminent threat from critical Windchill, FlexPLM RCE bug

PTC Inc. is warning of a critical vulnerability in Windchill and FlexPLM, widely used product lifecycle management (PLM) solutions, that could allow remote code execution.

The security issue, identified as CVE-2026-4681, could be leveraged through the deserialization of trusted data.

Its severity has prompted emergency action from German authorities, with the federal police (BKA) reportedly sending agents to affected companies to alert them to the cybersecurity risk.

Fix under development

There are no official patches available, but PTC states that it is “actively developing and releasing security patches for all supported Windchill versions” to address the issue.

According to the vendor, the flaw impacts most supported versions of Windchill and FlexPLM, including all critical patch sets (CPS) versions.

Until patches become available, system administrators are recommended to apply the vendor-provided Apache/IIS rule to deny access to the affected servlet path. PTC noted that the mitigation does not break functionality.

The same mitigation should be applied to all deployments, including Windchill, FlexPLM, and any file/replica servers, not just internet-facing systems. However, PTC advises prioritizing mitigations on internet-facing instances.

If mitigation is not possible, the vendor recommends temporarily disconnecting the affected instances from the internet or shutting down the service.

IoCs available

The company says that it has not found any evidence that the vulnerability is being exploited against PTC customers. However, PTC published a set of specific indicators of compromise (IoCs) that include a user agent string and files.

Additionally, the bulletin lists detection advice, including checks for webshells (GW.class, payload.bin, or dpr_<random>.jsp files), suspicious requests with patterns such as run?p= / .jsp?c= combined with unusual User-Agent activity, errors referencing GW, GW_READY_OK, or unexpected gateway exceptions.

"Presence of the GW.class or dpr_<8-hex-digits>.jsp on the Windchill server indicates the attacker has completed weaponization on the system prior to conducting remote code execution (RCE)" - PTC

Additionally, in an email to customers seen by BleepingComputer, the company said that "there is credible evidence of an imminent threat by a third-party group to exploit the vulnerability."

According to Heise, BKA officers were dispatched over the weekend to alert companies nationwide of the risk of CVE-2026-4681, even some that did not use any of the affected products.

The German outlet reports that the BKA woke up system administrators in the middle of the night to hand them a copy of PTC’s notification, and also alerted the state criminal investigation offices (LKA) in various federal states.

This unusual and urgent response by the authorities has sparked concerns that CVE-2026-4681 may be exploited or is likely to be exploited soon.

Given that PLM systems are also used by engineering firms in weapons system design, industrial manufacturing, and critical supply chains, the authorities’ response could be justified on grounds of protection from industrial espionage and other national security risks.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/ptc-warns-of-imminent-threat-from-critical-windchill-flexplm-rce-bug/
如有侵权请联系:admin#unsafe.sh