First published: Tue Feb 14 2023(Updated: )
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to stack-based buffer while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19472)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge Se2023 | <2210.0002.004 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-24566.
The severity of CVE-2023-24566 is high.
Solid Edge SE2022 (All versions < V222.0MP12) and Solid Edge SE2023 (All versions < V223.0Update2) are affected.
The vulnerability type of CVE-2023-24566 is stack-based buffer overflow.
Yes, Siemens has released a security advisory with mitigation measures for CVE-2023-24566. Please refer to the reference link for more information.