First published: Tue Aug 08 2023(Updated: )
A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.197), Parasolid V35.1 (All versions < V35.1.184), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.3). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted X_T file. This could allow an attacker to execute code in the context of the current process.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Parasolid | >=34.1<34.1.258 | |
Siemens Parasolid | >=35.0<35.0.254 | |
Siemens Parasolid | >=35.1<35.1.197 | |
Siemens Teamcenter Visualization | >=14.2<14.2.0.6 | |
Siemens Teamcenter Visualization | =14.1 | |
Siemens Teamcenter Visualization | =14.3 | |
Siemens Teamcenter Visualization | >=14.1<14.1.0.11 | |
Siemens Teamcenter Visualization | >=14.3<14.3.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-38528 is high with a score of 7.8.
Parasolid V34.1 (versions < V34.1.258), Parasolid V35.0 (versions < V35.0.254), Parasolid V35.1 (versions < V35.1.197), Teamcenter Visualization V14.1 (all versions), Teamcenter Visualization V14.2 (versions < V14.2.0.6) are affected by CVE-2023-38528.
CVE-2023-38528 is a vulnerability identified in Parasolid and Teamcenter Visualization software versions, which could allow attackers to execute arbitrary code or cause a denial of service.
To fix CVE-2023-38528, users should update their Parasolid and Teamcenter Visualization software to versions above the vulnerable ones mentioned in the advisory.
More information about CVE-2023-38528 can be found in the Siemens ProductCERT advisory, available at the provided reference link.