First published: Tue Aug 10 2021(Updated: )
A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). The PSKERNEL.dll library lacks proper validation while parsing user-supplied OBJ files that could cause an out of bounds access to an uninitialized pointer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13775)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge Viewer | ||
Siemens Solid Edge Se2021 Firmware | <se2021mp7 | |
Siemens Solid Edge Se2021 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-37180.
The title of this vulnerability is 'Siemens Solid Edge Viewer OBJ File Parsing Uninitialized Pointer Remote Code Execution Vulnerability'.
Yes, user interaction is required to exploit this vulnerability. The target must visit a malicious page or open a malicious file.
The severity of CVE-2021-37180 is high with a CVSS score of 7.8.
To fix this vulnerability, it is recommended to apply the necessary security patches or updates provided by Siemens.