Buffer Overflow Vulnerability in Solid Edge Software by Siemens
CVE-2021-27382

7.8HIGH

Key Information:

Vendor
Siemens
Vendor
CVE Published:
22 April 2021

Summary

A vulnerability has been detected in various versions of Solid Edge, attributed to insufficient validation of user-supplied data during the parsing of PAR files. This flaw may lead to a stack-based buffer overflow, allowing an attacker to potentially execute arbitrary code within the context of the affected process. Users of Solid Edge SE2020 and SE2021 must ensure they are operating on patched versions to mitigate this risk.

Affected Version(s)

Solid Edge SE2020 All versions < SE2020MP13

Solid Edge SE2020 All versions < SE2020MP14

Solid Edge SE2021 All Versions < SE2021MP4

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.