First published: Thu Apr 22 2021(Updated: )
A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2020 (All versions < SE2020MP14), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could lead to pointer dereferences of a value obtained from untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11919)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge Viewer | <=se2020mp13 | |
Siemens Solid Edge Se2021 | <se2021mp14 | |
Siemens Solid Edge SE2020: All versions before SE2020MP13 | ||
Siemens Solid Edge SE2020: All version before SE2020MP14 (only affected by CVE-2020-26997, CVE-2021-25678, CVE-2021-27382) | ||
Siemens Solid Edge SE2021: All versions before SE2021MP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-26997 is high with a value of 7.8.
Solid Edge SE2020 (all versions prior to SE2020MP13), Solid Edge SE2020 (all versions prior to SE2020MP14), and Solid Edge SE2021 (all versions prior to SE2021MP4) are affected by CVE-2020-26997.
CVE-2020-26997 is a vulnerability found in Solid Edge SE2020 and SE2021 that is caused by the lack of proper validation of user-supplied data when parsing PAR files, which can lead to pointer derangement.
The CVE-2020-26997 vulnerability can be exploited by supplying malicious input in PAR files during the parsing process.
Yes, you can refer to the following documents for more information on CVE-2020-26997: [Link 1](https://cert-portal.siemens.com/productcert/pdf/ssa-574442.pdf) and [Link 2](https://us-cert.cisa.gov/ics/advisories/icsa-21-103-06).