First published: Tue Feb 14 2023(Updated: )
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to stack-based buffer while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge Se2023 | <2210.0002.004 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-24549.
The severity of CVE-2023-24549 is high with a CVSS score of 7.8.
The affected software versions are Solid Edge SE2022 (All versions < V222.0MP12) and Solid Edge SE2023 (All versions < V223.0Update2).
The vulnerability type of CVE-2023-24549 is stack-based buffer overflow.
Yes, Siemens has released a security update to address this vulnerability. Please refer to the vendor's advisory for more information.