- What is the severity of CVE-2024-6071?
- CVE-2024-6071 has been scored as a critical severity vulnerability.
- How to fix CVE-2024-6071?
- To fix CVE-2024-6071: PTC recommends that users upgrade to Creo Elements/Direct License Server 20.7.0.1 or higher version: * Creo Elements/Direct Drafting https://support.ptc.com/appserver/auth/it/esd/product.jsp * Creo Elements/Direct Model/Drawing Mgr https://support.ptc.com/appserver/auth/it/esd/product.jsp * Creo Elements/Direct Modeling https://support.ptc.com/appserver/auth/it/esd/product.jsp * Creo Elements/Direct WorkManager https://support.ptc.com/appserver/auth/it/esd/product.jsp If additional questions remain, please contact PTC Technical Support. https://support.ptc.com/apps/case_logger_viewer/cs/auth/ssl/log For more information, see PTC's CS article https://www.ptc.com/en/support/article/CS417607 .
- Is CVE-2024-6071 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2024-6071 is being actively exploited. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2024-6071?
- CVE-2024-6071 affects PTC Creo Elements/Direct License.