Lucene search

K
cve[email protected]CVE-2023-24555
HistoryFeb 14, 2023 - 11:15 a.m.

CVE-2023-24555

2023-02-1411:15:15
CWE-125
web.nvd.nist.gov
19
cve-2023-24555
solid edge
se2022
se2023
vulnerability
code execution
par files
security

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.2%

A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.

Affected configurations

NVD
Node
siemenssolid_edge_se2022Match-
OR
siemenssolid_edge_se2022Matchmaintenance_pack_1
OR
siemenssolid_edge_se2022Matchmaintenance_pack_2
OR
siemenssolid_edge_se2022Matchmaintenance_pack_3
OR
siemenssolid_edge_se2022Matchmaintenance_pack_4
OR
siemenssolid_edge_se2022Matchmaintenance_pack_5
OR
siemenssolid_edge_se2022Matchmaintenance_pack_7
OR
siemenssolid_edge_se2022Matchmaintenance_pack_8
OR
siemenssolid_edge_se2022Matchmaintenance_pack_9
OR
siemenssolid_edge_se2022Matchmaintenance_pack_10
OR
siemenssolid_edge_se2022Matchmaintenance_pack_11
OR
siemenssolid_edge_se2023Range<2210.0002.004

CNA Affected

[
  {
    "vendor": "Siemens",
    "product": "Solid Edge SE2022",
    "versions": [
      {
        "version": "All versions < V222.0MP12",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "Solid Edge SE2023",
    "versions": [
      {
        "version": "All versions < V223.0Update2",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.2%

Related for CVE-2023-24555