First published: Thu Jun 17 2021(Updated: )
An improper check for unusual or exceptional conditions issue exists within the parsing DGN files from Drawings SDK (Version 2022.4 and prior) resulting from the lack of proper validation of the user-supplied data. This may result in several of out-of-bounds problems and allow attackers to cause a denial-of-service condition or execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Opendesign Drawings Sdk | <=2022.4 | |
Siemens COMOS | <10.4.1 | |
Siemens JT2Go | <13.2.0.2 | |
Siemens Teamcenter Visualization | <13.2.0.2 | |
Siemens JT2Go | ||
Open Design Alliance Drawings SDK | <2022.4 | 2022.4 |
Open Design Alliance Drawing SDK: Version 2022.4 is affected by CVE-2021-32946 and CVE-2021-32952 | ||
Siemens JT2Go | <13.2.0.2 | 13.2.0.2 |
Siemens Teamcenter Visualization | <13.2.0.2 | 13.2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32946 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability.
This vulnerability can be exploited by visiting a malicious page or opening a malicious file.
The severity of CVE-2021-32946 is high with a CVSS score of 7.8.
Siemens JT2Go, Opendesign Drawings Sdk, Siemens COMOS, and Siemens Teamcenter Visualization are affected by CVE-2021-32946.
You can find more information about CVE-2021-32946 in the references provided: [reference1](https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf), [reference2](https://cert-portal.siemens.com/productcert/pdf/ssa-938030.pdf), [reference3](https://us-cert.cisa.gov/ics/advisories/icsa-21-159-02).