First published: Tue Jul 12 2022(Updated: )
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-038)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Pads Viewer | ||
Siemens Pads Viewer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34273 has been rated as critical due to the potential for remote code execution.
To mitigate CVE-2022-34273, users should update to the latest version of Siemens PADS Viewer as specified in the vendor's security advisory.
CVE-2022-34273 can be exploited by using specially crafted PCB files.
CVE-2022-34273 affects all versions of Siemens PADS Standard and PADS Plus Viewer.
An attacker could potentially execute arbitrary code in the context of the current process by exploiting CVE-2022-34273.