First published: Mon Mar 15 2021(Updated: )
A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds read past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12534)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge | <se2021 | |
Siemens Solid Edge | =se2021 | |
Siemens Solid Edge | =se2021-maintenance_pack1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-27381 is high with a severity value of 7.8.
CVE-2021-27381 affects Solid Edge SE2020 (All Versions < SE2020MP13) and Solid Edge SE2021 (All Versions < SE2021MP3).
The vulnerability in Solid Edge SE2020 and SE2021 is the lack of proper validation of user-supplied data when parsing PAR files, which could result in an out of bounds read past the end of an allocated structure.
To fix CVE-2021-27381, it is recommended to update to Solid Edge SE2020MP13 or Solid Edge SE2021MP3.
More information about CVE-2021-27381 can be found at the following reference: [Siemens ProductCERT Advisory SSA-715184](https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf).