First published: Tue Jul 12 2022(Updated: )
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-040)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Pads Viewer | ||
Siemens Pads Viewer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34275 is considered to have a high severity due to the potential for remote code execution.
To fix CVE-2022-34275, users should update to the latest patched version of PADS Standard/Plus Viewer provided by Siemens.
The potential impacts of CVE-2022-34275 include unauthorized code execution which can compromise system integrity.
CVE-2022-34275 affects all versions of the PADS Standard/Plus Viewer software from Siemens.
CVE-2022-34275 allows an attacker to exploit an out of bounds write flaw when parsing specially crafted PCB files.