Stack-Based Buffer Overflow in Siemens Solid Edge SE2022 and SE2023
CVE-2023-24549

7.8HIGH

Key Information:

Vendor
Siemens
Vendor
CVE Published:
14 February 2023

Summary

A stack-based buffer overflow vulnerability exists in Siemens Solid Edge SE2022 and SE2023, which affects all versions before specified updates. This vulnerability can be exploited when parsing specially crafted PAR files. An attacker could potentially execute arbitrary code within the context of the application process, leading to unauthorized access and control over the affected system. It is crucial for users of Solid Edge to apply the necessary updates as outlined in Siemens' security advisories to mitigate this risk.

Affected Version(s)

Solid Edge SE2022 All versions < V222.0MP12

Solid Edge SE2023 All versions < V223.0Update2

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.