Buffer Overflow Vulnerability in Siemens JT2Go and Solid Edge Products
CVE-2020-26989
7.8HIGH
Key Information:
- Vendor
- Siemens
- Vendor
- CVE Published:
- 12 January 2021
Summary
A vulnerability exists in multiple Siemens products, where insufficient validation of user-supplied data during the parsing of PAR files can lead to a stack-based buffer overflow. This flaw allows attackers to potentially execute arbitrary code in the context of the affected application, which can compromise the integrity and security of system processes.
Affected Version(s)
JT2Go All versions < V13.1.0.1
Solid Edge SE2020 All Versions < SE2020MP12
Solid Edge SE2021 All Versions < SE2021MP2
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved