First published: Thu May 27 2021(Updated: )
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing PRT files. This could lead to pointer dereferences of a value obtained from an untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge Viewer | ||
Datakit CrossCadWare | <=2021.1 | |
Luxion KeyShot | <=10.1 | |
Siemens Solid Edge Se2020 Firmware | ||
Siemens Solid Edge Viewer | ||
Siemens Solid Edge Se2021 Firmware | ||
Siemens Solid Edge Se2021 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27496 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer.
This vulnerability can be exploited by visiting a malicious page or opening a malicious file.
The severity of CVE-2021-27496 is high with a CVSS score of 7.8.
Siemens Solid Edge Viewer versions up to and including 2021.1 are affected, as well as Luxion KeyShot version up to and including 10.1.
To mitigate CVE-2021-27496, users should update Siemens Solid Edge Viewer to a version beyond 2021.1 or Luxion KeyShot to a version beyond 10.1.