First published: Tue Sep 13 2022(Updated: )
A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.262), Parasolid V33.1 (All versions >= V33.1.262 < V33.1.263), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.161), Parasolid V35.0 (All versions >= V35.0.161 < V35.0.164), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The affected application contains an out of bounds write past the end of an allocated buffer while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17735)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simcenter Femap | >=2022.1<2022.1.3 | |
Siemens Simcenter Femap | >=2022.2<2022.2.2 | |
Siemens Parasolid | >=33.1<33.1.263 | |
Siemens Parasolid | >=34.0<34.0.252 | |
Siemens Parasolid | >=34.1<34.1.242 | |
Siemens Parasolid | >=35.0<35.0.164 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-39150 is high with a CVSS score of 7.8.
Siemens Simcenter Femap versions prior to 2022.1.4 and 2022.2.3 are affected by CVE-2022-39150.
Siemens Parasolid versions prior to 33.1.263, 34.0.252, and 34.1.242 are affected by CVE-2022-39150.
Yes, Siemens has released updates for affected versions of Siemens Simcenter Femap and Siemens Parasolid to address CVE-2022-39150.
You can find more information about CVE-2022-39150 at the following reference link: [CERT-Portal Siemens](https://cert-portal.siemens.com/productcert/pdf/ssa-518824.pdf)