A CVSS v3 base score of 7.8 has been assigned the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).ĬVE-2023-49122 has been assigned to this vulnerability. This could allow an attacker to execute code in the context of the current process.ĬVE-2023-49121 has been assigned to this vulnerability. The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. Solid Edge SE2023: All versions prior to V223.0 Update 10 The following Siemens products, are affected: Successful exploitation of these vulnerabilities could allow an attacker to use specially crafted PAR files to execute code in the context of the current process. Vulnerabilities: Heap-based Buffer Overflow, Out-of-bounds Read, Out-of-bounds Write, Stack-based Buffer Overflow, Access of Uninitialized Pointer As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |