First published: Thu Apr 22 2021(Updated: )
A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2020 (All versions < SE2020MP14), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12529)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge Viewer | <se2020mp14 | |
Siemens Solid Edge Se2021 | <se2021mp4 | |
Siemens Solid Edge Viewer | ||
Siemens Solid Edge SE2020: All versions before SE2020MP13 | ||
Siemens Solid Edge SE2020: All version before SE2020MP14 (only affected by CVE-2020-26997, CVE-2021-25678, CVE-2021-27382) | ||
Siemens Solid Edge SE2021: All versions before SE2021MP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25678 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer.
CVE-2021-25678 can be exploited when a user visits a malicious page or opens a malicious file, enabling remote attackers to execute arbitrary code.
CVE-2021-25678 has a severity level of 7.8 (high).
Siemens Solid Edge Viewer versions up to and including se2021mp4 and se2020mp14 are affected by CVE-2021-25678.
To mitigate CVE-2021-25678, it is recommended to update Siemens Solid Edge Viewer to a version beyond se2021mp4 or se2020mp14.