Code Execution Vulnerability in JT2Go and Solid Edge by Siemens
CVE-2021-34329
7.8HIGH
Key Information:
- Vendor
- Siemens
- Vendor
- CVE Published:
- 13 July 2021
Summary
A vulnerability exists in the plmxmlAdapterSE70.dll library utilized by JT2Go, Solid Edge, and Teamcenter Visualization. This flaw arises from the insufficient validation of user-supplied data during the parsing of PAR files. Consequently, an attacker could exploit this weakness to perform an out of bounds write, allowing execution of arbitrary code within the context of the current process. Proper validation mechanisms are crucial to mitigate such risks and protect users from potential exploitation.
Affected Version(s)
JT2Go All versions < V13.2
Solid Edge SE2021 All Versions < SE2021MP5
Teamcenter Visualization All versions < V13.2
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved