First published: Tue Feb 14 2023(Updated: )
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge Se2023 | <2210.0002.004 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-24563.
The severity of CVE-2023-24563 is high with a severity value of 7.8.
All versions of Solid Edge SE2022 < V222.0MP12 and all versions of Solid Edge SE2023 < V223.0Update2 are affected by CVE-2023-24563.
CVE-2023-24563 allows an attacker to exploit uninitialized pointer access while parsing specially crafted PAR files, potentially leading to remote code execution.
Yes, Siemens has released updates to address the vulnerability. Please refer to the referenced link for more information.