Stack-based Buffer Overflow Vulnerability in Solid Edge by Siemens
CVE-2020-28384
7.8HIGH
Key Information:
- Vendor
- Siemens
- Vendor
- CVE Published:
- 12 January 2021
Summary
A vulnerability has been identified in Solid Edge where the software fails to properly validate user-supplied data during the parsing of PAR files. This oversight can lead to a stack-based buffer overflow, allowing potential attackers to execute arbitrary code within the context of the affected process. Users of Solid Edge versions prior to SE2020MP12 and SE2021MP2 are advised to update their software to mitigate this security risk.
Affected Version(s)
Solid Edge SE2020 All Versions < SE2020MP12
Solid Edge SE2021 All Versions < SE2021MP2
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved