First published: Wed Feb 09 2022(Updated: )
A vulnerability has been identified in Simcenter Femap V2020.2 (All versions), Simcenter Femap V2021.1 (All versions). Affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14684)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simcenter Femap | =2020.2 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack1 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack2 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack3 | |
Siemens Simcenter Femap | =2021.1 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack1 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack2 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack3 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Siemens Simcenter Femap vulnerability is CVE-2021-46156.
CVE-2021-46156 has a severity rating of 7.8 (high).
This vulnerability in Siemens Simcenter Femap allows remote attackers to execute arbitrary code by exploiting a flaw in the parsing of NEU files.
Siemens Simcenter Femap versions 2020.2, 2020.2-maintenance_pack1, 2020.2-maintenance_pack2, 2020.2-maintenance_pack3, 2021.1, 2021.1-maintenance_pack1, 2021.1-maintenance_pack2, and 2021.1-maintenance_pack3 are affected.
To mitigate the risk posed by CVE-2021-46156, it is recommended to update Siemens Simcenter Femap to the latest version available and follow the recommendations provided by the vendor.