First published: Wed Feb 09 2022(Updated: )
A vulnerability has been identified in Simcenter Femap V2020.2 (All versions), Simcenter Femap V2021.1 (All versions). Affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15286)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simcenter Femap | =2020.2 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack1 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack2 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack3 | |
Siemens Simcenter Femap | =2021.1 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack1 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack2 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack3 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46160 is a vulnerability in Siemens Simcenter Femap that allows remote attackers to execute arbitrary code.
CVE-2021-46160 exploits a flaw in the parsing of Siemens Simcenter Femap NEU files, allowing remote code execution.
Yes, user interaction is required for the vulnerability to be exploited, such as visiting a malicious page or opening a malicious file.
Siemens Simcenter Femap versions 2020.2, 2020.2-maintenance_pack1, 2020.2-maintenance_pack2, 2020.2-maintenance_pack3, 2021.1, 2021.1-maintenance_pack1, 2021.1-maintenance_pack2, and 2021.1-maintenance_pack3 are affected by CVE-2021-46160.
CVE-2021-46160 has a severity rating of 7.8 out of 10 (high severity).
Apply the necessary security patches or updates provided by Siemens to fix the vulnerability in affected versions of Siemens Simcenter Femap.