First published: Tue Jul 12 2022(Updated: )
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing PCB files. An attacker could leverage this vulnerability to execute code in the context of the current process. (FG-VD-22-044)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Pads Viewer | ||
Siemens Pads Viewer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-34279 is rated as significant due to its potential for code execution.
To fix CVE-2022-34279, users should update to the latest version of the PADS Standard/Plus Viewer that includes the security patch.
CVE-2022-34279 can be exploited to execute arbitrary code when a malicious PCB file is processed.
All versions of Siemens PADS Standard and Plus Viewer are affected by CVE-2022-34279.
Yes, user data could be at risk if an attacker successfully exploits CVE-2022-34279 to execute malicious code.