Buffer Overflow Vulnerability in Siemens JT2Go and Solid Edge Products
CVE-2020-26989

7.8HIGH

Key Information:

Vendor
Siemens
Vendor
CVE Published:
12 January 2021

Summary

A vulnerability exists in multiple Siemens products, where insufficient validation of user-supplied data during the parsing of PAR files can lead to a stack-based buffer overflow. This flaw allows attackers to potentially execute arbitrary code in the context of the affected application, which can compromise the integrity and security of system processes.

Affected Version(s)

JT2Go All versions < V13.1.0.1

Solid Edge SE2020 All Versions < SE2020MP12

Solid Edge SE2021 All Versions < SE2021MP2

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.