First published: Wed Feb 09 2022(Updated: )
A vulnerability has been identified in Simcenter Femap V2020.2 (All versions), Simcenter Femap V2021.1 (All versions). Affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15302)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simcenter Femap | =2020.2 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack1 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack2 | |
Siemens Simcenter Femap | =2020.2-maintenance_pack3 | |
Siemens Simcenter Femap | =2021.1 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack1 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack2 | |
Siemens Simcenter Femap | =2021.1-maintenance_pack3 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46161 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Siemens Simcenter Femap.
The CVE-2021-46161 vulnerability can be exploited when the target visits a malicious page or opens a malicious file.
The severity of CVE-2021-46161 is high, with a severity value of 7.8.
Siemens Simcenter Femap versions 2020.2, 2020.2-maintenance_pack1, 2020.2-maintenance_pack2, 2020.2-maintenance_pack3, 2021.1, 2021.1-maintenance_pack1, 2021.1-maintenance_pack2, and 2021.1-maintenance_pack3 are affected by CVE-2021-46161.
To mitigate the CVE-2021-46161 vulnerability, users should follow the recommendations provided by Siemens in their security advisory.