A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf - Vendor Advisory |
10 Jan 2024, 20:31
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0007:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_se2023:223.0:-:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0004:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0009:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0003:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0006:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0008:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0001:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0002:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_se2023:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0005:*:*:*:*:*:* |
|
CWE | CWE-787 | |
First Time |
Siemens
Siemens solid Edge Se2023 |
|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf - Vendor Advisory |
09 Jan 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-09 10:15
Updated : 2024-11-21 08:32
NVD link : CVE-2023-49123
Mitre link : CVE-2023-49123
CVE.ORG link : CVE-2023-49123
JSON object : View
Products Affected
siemens
- solid_edge_se2023