First published: Thu May 27 2021(Updated: )
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing STP files. This could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge Viewer | ||
Datakit CrossCadWare | <=2021.1 | |
Luxion KeyShot | <=10.1 | |
Siemens Solid Edge Se2020 Firmware | ||
Siemens Solid Edge Viewer | ||
Siemens Solid Edge Se2021 Firmware | ||
Siemens Solid Edge Se2021 | ||
Datakit CatiaV5_3dRead | ||
Datakit CatiaV6_3dRead | ||
Datakit Step3dRead | ||
Datakit Ug3dReadPsr | ||
Datakit Jt3dReadPsr |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-27494.
The title of this vulnerability is (0Day) Siemens Solid Edge Viewer STP File Parsing Stack-based Buffer Overflow Remote Code Execution.
The severity of CVE-2021-27494 is high with a CVSS score of 7.8.
The affected software products are Siemens Solid Edge Viewer, Datakit CrossCadWare, and Luxion KeyShot.
This vulnerability can be exploited by remote attackers who can execute arbitrary code by tricking the target into visiting a malicious page or opening a malicious file.