First published: Wed Feb 09 2022(Updated: )
A vulnerability has been identified in Simcenter Femap V2020.2 (All versions), Simcenter Femap V2021.1 (All versions). Affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15050)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simcenter Femap | =2020.2 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack1 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack2 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack3 | |
Siemens Simcenter Femap | =2021.1 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack1 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack2 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack3 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Siemens Simcenter Femap vulnerability is CVE-2021-46159.
The title of this vulnerability is 'Siemens Simcenter Femap NEU File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability'.
Remote attackers can exploit this vulnerability by executing arbitrary code on affected installations of Siemens Simcenter Femap when the target visits a malicious page or opens a malicious file.
This vulnerability has a severity rating of 7.8, which is considered high.
The affected software is Siemens Simcenter Femap version 2020.2, 2020.2-maintenance_pack1, 2020.2-maintenance_pack2, 2020.2-maintenance_pack3, 2021.1, 2021.1-maintenance_pack1, 2021.1-maintenance_pack2, and 2021.1-maintenance_pack3.
To fix this vulnerability, users should apply the necessary patches or updates provided by Siemens.
More information about this vulnerability can be found in the following references: 1. [Siemens ProductCERT Advisory](https://cert-portal.siemens.com/productcert/pdf/ssa-609880.pdf) 2. [ZDI Advisory](https://www.zerodayinitiative.com/advisories/ZDI-22-314/)