First published: Tue Jul 12 2022(Updated: )
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains a stack corruption vulnerability while parsing PCB files. An attacker could leverage this vulnerability to leak information in the context of the current process. (FG-VD-22-052, FG-VD-22-056)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Pads Viewer | ||
Siemens Pads Viewer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34287 is classified as a high severity vulnerability due to its potential to cause stack corruption.
To mitigate CVE-2022-34287, users should update to the latest version of PADS Standard/Plus Viewer provided by Siemens.
CVE-2022-34287 is a stack corruption vulnerability that occurs while parsing PCB files in the affected applications.
Yes, if exploited, CVE-2022-34287 could allow an attacker to leak sensitive information from the current process.
All versions of Siemens PADS Standard/Plus Viewer are affected by CVE-2022-34287.