First published: Thu May 27 2021(Updated: )
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing PRT files. This could lead to pointer dereferences of a value obtained from an untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge Viewer | ||
Datakit CatiaV5 3D Read | ||
Datakit CatiaV6 3D Read | ||
Datakit Step3dRead | ||
Datakit Ug3dReadPsr | ||
Datakit JT3D Read PSR | ||
Datakit CrossCAD/Ware | <=2021.1 | |
Luxion KeyShot Network Rendering | <=10.1 | |
Siemens Solid Edge SE2020 | ||
Siemens Solid Edge | ||
Siemens Solid Edge SE2021 | ||
Siemens Solid Edge |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27496 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer.
This vulnerability can be exploited by visiting a malicious page or opening a malicious file.
The severity of CVE-2021-27496 is high with a CVSS score of 7.8.
Siemens Solid Edge Viewer versions up to and including 2021.1 are affected, as well as Luxion KeyShot version up to and including 10.1.
To mitigate CVE-2021-27496, users should update Siemens Solid Edge Viewer to a version beyond 2021.1 or Luxion KeyShot to a version beyond 10.1.