First published: Wed Feb 09 2022(Updated: )
A vulnerability has been identified in Simcenter Femap V2020.2 (All versions), Simcenter Femap V2021.1 (All versions). Affected application contains a memory corruption vulnerability while parsing NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14757)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simcenter Femap | =2020.2 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack1 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack2 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack3 | |
Siemens Simcenter Femap | =2021.1 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack1 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack2 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack3 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46157 is a vulnerability in Siemens Simcenter Femap that allows remote attackers to execute arbitrary code.
To exploit CVE-2021-46157, the target must visit a malicious page or open a malicious file.
The severity of CVE-2021-46157 is high with a CVSS score of 7.8.
Siemens Simcenter Femap versions 2020.2, 2020.2-maintenance_pack1, 2020.2-maintenance_pack2, 2020.2-maintenance_pack3, 2021.1, 2021.1-maintenance_pack1, 2021.1-maintenance_pack2, and 2021.1-maintenance_pack3 are affected by CVE-2021-46157.
To mitigate CVE-2021-46157, users should update to the latest version of Siemens Simcenter Femap and exercise caution while visiting websites or opening files from untrusted sources.