CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
19.1%
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
Vendor | Product | Version | CPE |
---|---|---|---|
siemens | solid_edge_se2023 | * | cpe:2.3:a:siemens:solid_edge_se2023:*:*:*:*:*:*:*:* |
siemens | solid_edge_se2023 | 223.0 | cpe:2.3:a:siemens:solid_edge_se2023:223.0:-:*:*:*:*:*:* |
siemens | solid_edge_se2023 | 223.0 | cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0001:*:*:*:*:*:* |
siemens | solid_edge_se2023 | 223.0 | cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0002:*:*:*:*:*:* |
siemens | solid_edge_se2023 | 223.0 | cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0003:*:*:*:*:*:* |
siemens | solid_edge_se2023 | 223.0 | cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0004:*:*:*:*:*:* |
siemens | solid_edge_se2023 | 223.0 | cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0005:*:*:*:*:*:* |
siemens | solid_edge_se2023 | 223.0 | cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0006:*:*:*:*:*:* |
siemens | solid_edge_se2023 | 223.0 | cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0007:*:*:*:*:*:* |
siemens | solid_edge_se2023 | 223.0 | cpe:2.3:a:siemens:solid_edge_se2023:223.0:update_0008:*:*:*:*:*:* |