First published: Tue Feb 14 2023(Updated: )
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application contains an out of bounds read past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to to execute code in the context of the current process.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge Se2023 | <2210.0002.004 | |
Siemens Solid Edge Se2022 | ||
Siemens Solid Edge Se2022 | =maintenance_pack_1 | |
Siemens Solid Edge Se2022 | =maintenance_pack_2 | |
Siemens Solid Edge Se2022 | =maintenance_pack_3 | |
Siemens Solid Edge Se2022 | =maintenance_pack_4 | |
Siemens Solid Edge Se2022 | =maintenance_pack_5 | |
Siemens Solid Edge Se2022 | =maintenance_pack_7 | |
Siemens Solid Edge Se2022 | =maintenance_pack_8 | |
Siemens Solid Edge Se2022 | =maintenance_pack_9 | |
Siemens Solid Edge Se2022 | =maintenance_pack_10 | |
Siemens Solid Edge Se2022 | =maintenance_pack_11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-24552.
The severity of CVE-2023-24552 is high.
All versions of Solid Edge SE2023 up to V223.0Update2 are affected by CVE-2023-24552.
CVE-2023-24552 exploits the system by causing an out of bounds read past the end of an allocated buffer while parsing a specially crafted PAR file.
Yes, Siemens has released a fix for CVE-2023-24552. Please refer to the provided reference link for more information.