First published: Thu May 27 2021(Updated: )
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge Viewer | ||
Datakit CrossCadWare | <=2021.1 | |
Luxion KeyShot | <=10.1 | |
Siemens Solid Edge Se2020 Firmware | ||
Siemens Solid Edge Viewer | ||
Siemens Solid Edge Se2021 Firmware | ||
Siemens Solid Edge Se2021 | ||
Datakit CatiaV5_3dRead | ||
Datakit CatiaV6_3dRead | ||
Datakit Step3dRead | ||
Datakit Ug3dReadPsr | ||
Datakit Jt3dReadPsr |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27490 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer.
To exploit this vulnerability, the target must visit a malicious page or open a malicious file.
Siemens Solid Edge Viewer, Datakit CrossCadWare, Luxion KeyShot, and Siemens Solid Edge Se2020 and Se2021 Firmware are affected by this vulnerability.
CVE-2021-27490 has a severity level of 7.8 (high).
To fix CVE-2021-27490, it is recommended to apply the necessary security updates or patches provided by Siemens for the affected software products.