First published: Tue Dec 13 2022(Updated: )
A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.264), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.170), Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19384)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Parasolid | >=33.1<33.1.264 | |
Siemens Parasolid | >=34.0<34.0.252 | |
Siemens Parasolid | >=34.1<34.1.242 | |
Siemens Parasolid | >=35.0<35.0.170 | |
>=33.1<33.1.264 | ||
>=34.0<34.0.252 | ||
>=34.1<34.1.242 | ||
>=35.0<35.0.170 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-46349.
The severity of CVE-2022-46349 is high with a severity value of 7.8.
The affected software for CVE-2022-46349 includes Siemens Parasolid V33.1 (versions < V33.1.264), Parasolid V34.0 (versions < V34.0.252), Parasolid V34.1 (versions < V34.1.242), Parasolid V35.0 (versions < V35.0.170), Solid Edge SE2022 (versions < V222.0MP12), and Solid Edge SE2022 (all versions).
To fix CVE-2022-46349, it is recommended to upgrade to the latest version of the affected software provided by Siemens.
You can find more information about CVE-2022-46349 in the following references: [Link 1](https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf), [Link 2](https://cert-portal.siemens.com/productcert/pdf/ssa-588101.pdf).