First published: Tue Aug 08 2023(Updated: )
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to execute code in the context of the current process.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Solid Edge | <se2023 | |
Siemens Solid Edge | =se2023 | |
Siemens Solid Edge | =se2023-maintenance_pack1 | |
Siemens Solid Edge | =se2023-maintenance_pack2 | |
Siemens Solid Edge | =se2023-maintenance_pack3 | |
Siemens Solid Edge | =se2023-maintenance_pack4 | |
Siemens Solid Edge | =se2023-maintenance_pack5 | |
Siemens Solid Edge | =se2023-maintenance_pack6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-39181.
The affected software is Siemens Solid Edge SE2023 (All versions < V223.0 Update 7).
The severity of CVE-2023-39181 is high with a CVSS score of 7.8.
This vulnerability allows an attacker to execute code in the context of the current user.
Yes, the fix for CVE-2023-39181 is included in the V223.0 Update 7 of Siemens Solid Edge SE2023.