First published: Thu May 27 2021(Updated: )
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing CATPart files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge Viewer | ||
Datakit CrossCadWare | <=2021.1 | |
Luxion KeyShot | <=10.1 | |
Siemens Solid Edge Se2020 Firmware | ||
Siemens Solid Edge Viewer | ||
Siemens Solid Edge Se2021 Firmware | ||
Siemens Solid Edge Se2021 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27488 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer.
An attacker can exploit CVE-2021-27488 by tricking the target into visiting a malicious page or opening a malicious file.
Siemens Solid Edge Viewer, Datakit CrossCadWare (up to version 2021.1), and Luxion KeyShot (up to version 10.1) are affected by CVE-2021-27488.
CVE-2021-27488 has a severity rating of 7.8 (high).
To fix CVE-2021-27488, users should update their Siemens Solid Edge Viewer, Datakit CrossCadWare, and Luxion KeyShot to the latest versions available.