A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-012-04 | Third Party Advisory US Government Resource |
https://www.zerodayinitiative.com/advisories/ZDI-21-048/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-053/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-074/ | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: siemens
Published: 2021-01-12T20:18:35
Updated: 2021-02-09T15:38:20
Reserved: 2020-11-10T00:00:00
Link: CVE-2020-28381
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-01-12T21:15:17.683
Modified: 2021-12-10T21:47:07.840
Link: CVE-2020-28381
JSON object: View
Redhat Information
No data.
CWE