A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-012-04 | Third Party Advisory US Government Resource |
https://www.zerodayinitiative.com/advisories/ZDI-21-048/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-053/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-074/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-01-12 21:15
Updated : 2024-02-28 18:08
NVD link : CVE-2020-28381
Mitre link : CVE-2020-28381
CVE.ORG link : CVE-2020-28381
JSON object : View
Products Affected
siemens
- solid_edge
CWE
CWE-787
Out-of-bounds Write