Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-28381


A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.


Published

2021-01-12T21:15:17.683

Last Modified

2024-11-21T05:22:41.210

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-787
  • Type: Primary
    CWE-787

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application siemens solid_edge < se2020 Yes
Application siemens solid_edge se2020 Yes
Application siemens solid_edge se2020 Yes
Application siemens solid_edge se2020 Yes
Application siemens solid_edge se2020 Yes
Application siemens solid_edge se2020 Yes
Application siemens solid_edge se2020 Yes
Application siemens solid_edge se2020 Yes
Application siemens solid_edge se2020 Yes
Application siemens solid_edge se2020 Yes
Application siemens solid_edge se2020 Yes
Application siemens solid_edge se2020 Yes
Application siemens solid_edge se2020 Yes
Application siemens solid_edge se2021 Yes
Application siemens solid_edge se2021 Yes

References