Vulnerabilites related to Siemens - Solid Edge
var-202103-0230
Vulnerability from variot

A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). When opening a specially crafted SEECTCXML file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11923). Zero Day Initiative To this vulnerability ZDI-CAN-11923 Was numbered.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SEECTCXML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0230",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2021mp3",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2020mp13",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-266",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016316",
         },
         {
            db: "NVD",
            id: "CVE-2020-28387",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28387",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "rgod",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-266",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2020-28387",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.3,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2020-28387",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 1.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-28387",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-28387",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-28387",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-28387",
                  trust: 1.8,
                  value: "Medium",
               },
               {
                  author: "ZDI",
                  id: "CVE-2020-28387",
                  trust: 0.7,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202103-696",
                  trust: 0.6,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-266",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016316",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-696",
         },
         {
            db: "NVD",
            id: "CVE-2020-28387",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). When opening a specially crafted SEECTCXML file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11923). Zero Day Initiative To this vulnerability ZDI-CAN-11923 Was numbered.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SEECTCXML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28387",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016316",
         },
         {
            db: "ZDI",
            id: "ZDI-21-266",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-28387",
            trust: 3.1,
         },
         {
            db: "SIEMENS",
            id: "SSA-715184",
            trust: 1.6,
         },
         {
            db: "ZDI",
            id: "ZDI-21-266",
            trust: 1.3,
         },
         {
            db: "JVN",
            id: "JVNVU93441670",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016316",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-11923",
            trust: 0.7,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-068-09",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0854",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-696",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-266",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016316",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-696",
         },
         {
            db: "NVD",
            id: "CVE-2020-28387",
         },
      ],
   },
   id: "VAR-202103-0230",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-04T08:13:28.253000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-715184",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf",
         },
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-09",
         },
         {
            title: "Siemens Solid Edge Fixes for code issue vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=144058",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-266",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016316",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-696",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-611",
            trust: 1,
         },
         {
            problemtype: "XML Improper restrictions on external entity references (CWE-611) [ Other ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-016316",
         },
         {
            db: "NVD",
            id: "CVE-2020-28387",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-28387",
         },
         {
            trust: 1.3,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-09",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu93441670/",
         },
         {
            trust: 0.6,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-266/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0854",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-266",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016316",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-696",
         },
         {
            db: "NVD",
            id: "CVE-2020-28387",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-266",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016316",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-696",
         },
         {
            db: "NVD",
            id: "CVE-2020-28387",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-03-11T00:00:00",
            db: "ZDI",
            id: "ZDI-21-266",
         },
         {
            date: "2021-11-22T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-016316",
         },
         {
            date: "2021-03-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202103-696",
         },
         {
            date: "2021-03-15T17:15:00",
            db: "NVD",
            id: "CVE-2020-28387",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-03-11T00:00:00",
            db: "ZDI",
            id: "ZDI-21-266",
         },
         {
            date: "2021-11-22T09:06:00",
            db: "JVNDB",
            id: "JVNDB-2020-016316",
         },
         {
            date: "2021-03-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202103-696",
         },
         {
            date: "2021-07-15T18:00:00",
            db: "NVD",
            id: "CVE-2020-28387",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202103-696",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Solid Edge  In  XML  External entity vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-016316",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "code problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202103-696",
         },
      ],
      trust: 0.6,
   },
}

var-202101-0484
Vulnerability from variot

A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing PAR files. This can result in an out of bounds write past the memory location that is a read only image address. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11885). Several Siemens products are vulnerable to out-of-bounds writes. Zero Day Initiative To this vulnerability ZDI-CAN-11885 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT, VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment.

JT2Go and Teamcenter Visualization have security vulnerabilities

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0484",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.1.0.1",
         },
         {
            model: "jt2go",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.1.0.1",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.1.0.1",
         },
         {
            model: "solid edge",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
         {
            model: "jt2go",
            scope: "lt",
            trust: 0.6,
            vendor: "siemens",
            version: "v13.1.0",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 0.6,
            vendor: "siemens",
            version: "v13.1.0",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-073",
         },
         {
            db: "ZDI",
            id: "ZDI-21-047",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02574",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015261",
         },
         {
            db: "NVD",
            id: "CVE-2020-28383",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.1.0.1",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.1.0.1",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack10:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack11:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack8:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack9:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28383",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "rgod",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-073",
         },
         {
            db: "ZDI",
            id: "ZDI-21-047",
         },
      ],
      trust: 1.4,
   },
   cve: "CVE-2020-28383",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2020-28383",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "CNVD-2021-02574",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-28383",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1.4,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-28383",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-28383",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2020-28383",
                  trust: 1.4,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2021-02574",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202101-918",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-073",
         },
         {
            db: "ZDI",
            id: "ZDI-21-047",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02574",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015261",
         },
         {
            db: "NVD",
            id: "CVE-2020-28383",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-918",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing PAR files. This can result in an out of bounds write past the memory location that is a read only image address. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11885). Several Siemens products are vulnerable to out-of-bounds writes. Zero Day Initiative To this vulnerability ZDI-CAN-11885 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT, VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment. \n\r\n\r\nJT2Go and Teamcenter Visualization have security vulnerabilities",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28383",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015261",
         },
         {
            db: "ZDI",
            id: "ZDI-21-073",
         },
         {
            db: "ZDI",
            id: "ZDI-21-047",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02574",
         },
      ],
      trust: 3.42,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-28383",
            trust: 4.4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-047",
            trust: 3.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-012-04",
            trust: 2.4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-073",
            trust: 2.3,
         },
         {
            db: "SIEMENS",
            id: "SSA-622830",
            trust: 2.2,
         },
         {
            db: "ZDI",
            id: "ZDI-21-054",
            trust: 1.6,
         },
         {
            db: "SIEMENS",
            id: "SSA-979834",
            trust: 1.6,
         },
         {
            db: "SIEMENS",
            id: "SSA-663999",
            trust: 1.6,
         },
         {
            db: "JVN",
            id: "JVNVU91685542",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015261",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-11921",
            trust: 0.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-11885",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02574",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-040-06",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-012-03",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0125",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-918",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-073",
         },
         {
            db: "ZDI",
            id: "ZDI-21-047",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02574",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015261",
         },
         {
            db: "NVD",
            id: "CVE-2020-28383",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-918",
         },
      ],
   },
   id: "VAR-202101-0484",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-02574",
         },
      ],
      trust: 0.75799868,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "ICS",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-02574",
         },
      ],
   },
   last_update_date: "2023-12-18T11:03:38.451000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "",
            trust: 1.4,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/",
         },
         {
            title: "SSA-979834",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf",
         },
         {
            title: "Patch for Unspecified vulnerability exists in JT2Go and Teamcenter Visualization (CNVD-2021-02574)",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/243958",
         },
         {
            title: "Siemens Jt2go  and Siemens Teamcenter Visualization Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139393",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-073",
         },
         {
            db: "ZDI",
            id: "ZDI-21-047",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02574",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015261",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-918",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015261",
         },
         {
            db: "NVD",
            id: "CVE-2020-28383",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-04",
         },
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-047/",
         },
         {
            trust: 2.2,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
         },
         {
            trust: 1.6,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-054/",
         },
         {
            trust: 1.6,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-073/",
         },
         {
            trust: 1.4,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-28383",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu91685542/",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0125/",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-073",
         },
         {
            db: "ZDI",
            id: "ZDI-21-047",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02574",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015261",
         },
         {
            db: "NVD",
            id: "CVE-2020-28383",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-918",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-073",
         },
         {
            db: "ZDI",
            id: "ZDI-21-047",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02574",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015261",
         },
         {
            db: "NVD",
            id: "CVE-2020-28383",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-918",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-01-19T00:00:00",
            db: "ZDI",
            id: "ZDI-21-073",
         },
         {
            date: "2021-01-14T00:00:00",
            db: "ZDI",
            id: "ZDI-21-047",
         },
         {
            date: "2021-01-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-02574",
         },
         {
            date: "2021-09-15T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-015261",
         },
         {
            date: "2021-01-12T21:15:17.853000",
            db: "NVD",
            id: "CVE-2020-28383",
         },
         {
            date: "2021-01-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202101-918",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-01-19T00:00:00",
            db: "ZDI",
            id: "ZDI-21-073",
         },
         {
            date: "2021-01-14T00:00:00",
            db: "ZDI",
            id: "ZDI-21-047",
         },
         {
            date: "2021-02-04T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-02574",
         },
         {
            date: "2021-09-15T08:32:00",
            db: "JVNDB",
            id: "JVNDB-2020-015261",
         },
         {
            date: "2022-10-12T16:45:09.747000",
            db: "NVD",
            id: "CVE-2020-28383",
         },
         {
            date: "2021-05-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202101-918",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202101-918",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Out-of-bounds write vulnerabilities in multiple Siemens products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015261",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202101-918",
         },
      ],
      trust: 0.6,
   },
}

var-202109-1120
Vulnerability from variot

A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13789). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of OBJ files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1120",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1121",
         },
         {
            db: "NVD",
            id: "CVE-2021-41537",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41537",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "xina1i",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1121",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1840",
         },
      ],
      trust: 1.3,
   },
   cve: "CVE-2021-41537",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2021-41537",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.1,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41537",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41537",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-41537",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-41537",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202109-1840",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-41537",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1121",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41537",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1840",
         },
         {
            db: "NVD",
            id: "CVE-2021-41537",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13789). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of OBJ files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41537",
         },
         {
            db: "ZDI",
            id: "ZDI-21-1121",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41537",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-41537",
            trust: 2.4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-1121",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-728618",
            trust: 1.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-13789",
            trust: 0.7,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-287-06",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021092905",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3454",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1840",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-41537",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1121",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41537",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1840",
         },
         {
            db: "NVD",
            id: "CVE-2021-41537",
         },
      ],
   },
   id: "VAR-202109-1120",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-04T07:48:29.675000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "",
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            title: "Siemens Solid Edge Remediation of resource management error vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=164368",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=3b85ee03e935aff52e55e7402b3926a1",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1121",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41537",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1840",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-416",
            trust: 2,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41537",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-1121/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-287-06",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3454",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-41537",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021092905",
         },
         {
            trust: 0.2,
            url: "https://cwe.mitre.org/data/definitions/416.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1121",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41537",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1840",
         },
         {
            db: "NVD",
            id: "CVE-2021-41537",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-1121",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41537",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1840",
         },
         {
            db: "NVD",
            id: "CVE-2021-41537",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1121",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41537",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1840",
         },
         {
            date: "2021-09-28T12:15:00",
            db: "NVD",
            id: "CVE-2021-41537",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1121",
         },
         {
            date: "2021-10-01T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41537",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-10-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1840",
         },
         {
            date: "2021-10-01T13:52:00",
            db: "NVD",
            id: "CVE-2021-41537",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-1840",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens Solid Edge Viewer OBJ File Parsing Use-After-Free Remote Code Execution Vulnerability",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1121",
         },
      ],
      trust: 0.7,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202109-1792
Vulnerability from variot

A vulnerability has been identified in NX 1953 Series (All versions < V1973.3700), NX 1980 Series (All versions < V1988), Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of OBJ files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1792",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "nx 1969",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1973.3700",
         },
         {
            model: "nx 1984",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1984",
         },
         {
            model: "nx 1961",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1973.3700",
         },
         {
            model: "nx 1965",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1973.3700",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "nx 1988",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1984",
         },
         {
            model: "nx 1957",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1973.3700",
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1119",
         },
         {
            db: "NVD",
            id: "CVE-2021-41535",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1984_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1984",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1984:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1984_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1984",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1984:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1988_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1984",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1988:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1988_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1984",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1988:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1957_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1973.3700",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1957:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1957_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1973.3700",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1957:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1961_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1973.3700",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1961:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1961_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1973.3700",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1961:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1965_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1973.3700",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1965:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1965_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1973.3700",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1965:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1969_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1973.3700",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1969:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1969_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1973.3700",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1969:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41535",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "xina1i",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1119",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1837",
         },
      ],
      trust: 1.3,
   },
   cve: "CVE-2021-41535",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2021-41535",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.1,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41535",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41535",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-41535",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-41535",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202109-1837",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-41535",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1119",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41535",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1837",
         },
         {
            db: "NVD",
            id: "CVE-2021-41535",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in NX 1953 Series (All versions < V1973.3700), NX 1980 Series (All versions < V1988), Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of OBJ files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41535",
         },
         {
            db: "ZDI",
            id: "ZDI-21-1119",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41535",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-41535",
            trust: 2.4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-1119",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-728618",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-328042",
            trust: 1.6,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-13771",
            trust: 0.7,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021092905",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021111007",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3454",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3874",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-315-08",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-287-06",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1837",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-41535",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1119",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41535",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1837",
         },
         {
            db: "NVD",
            id: "CVE-2021-41535",
         },
      ],
   },
   id: "VAR-202109-1792",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-04T07:50:56.011000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "",
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            title: "Siemens Solid Edge Remediation of resource management error vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=164366",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=3b85ee03e935aff52e55e7402b3926a1",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1119",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41535",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1837",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-416",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41535",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-1119/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf",
         },
         {
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-287-06",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3874",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3454",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-41535",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021092905",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-315-08",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021111007",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/416.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1119",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41535",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1837",
         },
         {
            db: "NVD",
            id: "CVE-2021-41535",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-1119",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41535",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1837",
         },
         {
            db: "NVD",
            id: "CVE-2021-41535",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1119",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41535",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1837",
         },
         {
            date: "2021-09-28T12:15:00",
            db: "NVD",
            id: "CVE-2021-41535",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1119",
         },
         {
            date: "2021-10-01T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41535",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-11-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1837",
         },
         {
            date: "2021-11-28T23:22:00",
            db: "NVD",
            id: "CVE-2021-41535",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-1837",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens Solid Edge Viewer OBJ File Parsing Use-After-Free Remote Code Execution Vulnerability",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1119",
         },
      ],
      trust: 0.7,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202107-1424
Vulnerability from variot

A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter Visualization (All versions < V13.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13427). Zero Day Initiative To this vulnerability ZDI-CAN-13427 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1424",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "jt2go",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.2",
         },
         {
            model: "solid edge",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-867",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009276",
         },
         {
            db: "NVD",
            id: "CVE-2021-34329",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-34329",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Mat Powell of Trend Micro Zero Day Initiative",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-867",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2021-34329",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-34329",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-34329",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-34329",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-34329",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-34329",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202107-925",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-34329",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-867",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34329",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009276",
         },
         {
            db: "NVD",
            id: "CVE-2021-34329",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-925",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter Visualization (All versions < V13.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13427). Zero Day Initiative To this vulnerability  ZDI-CAN-13427 Was numbered.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-34329",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009276",
         },
         {
            db: "ZDI",
            id: "ZDI-21-867",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34329",
         },
      ],
      trust: 2.88,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-34329",
            trust: 4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-867",
            trust: 3.2,
         },
         {
            db: "SIEMENS",
            id: "SSA-173615",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-483182",
            trust: 1.7,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009276",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-13427",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2403",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021071508",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-194-15",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-925",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-34329",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-867",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34329",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009276",
         },
         {
            db: "NVD",
            id: "CVE-2021-34329",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-925",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   id: "VAR-202107-1424",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.15799868,
   },
   last_update_date: "2023-12-18T11:37:14.093000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-173615 Siemens Security Advisory",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf",
         },
         {
            title: "",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-15https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf",
         },
         {
            title: "Siemens Jt2go  and  Siemens Teamcenter Visualization Security vulnerabilities",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=156618",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=e172da356a059f9e1b4ef7215ce64ef1",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=aa85c53444a3e0726ddb55922c9060c8",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2021-34329 ",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-867",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34329",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009276",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-925",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Incorrect input confirmation (CWE-20) [NVD Evaluation ]",
            trust: 0.8,
         },
         {
            problemtype: " Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-009276",
         },
         {
            db: "NVD",
            id: "CVE-2021-34329",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.6,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-867/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-34329",
         },
         {
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-15https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021071508",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2403",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-15",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/787.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2021-34329",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-867",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34329",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009276",
         },
         {
            db: "NVD",
            id: "CVE-2021-34329",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-925",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-867",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34329",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009276",
         },
         {
            db: "NVD",
            id: "CVE-2021-34329",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-925",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-07-19T00:00:00",
            db: "ZDI",
            id: "ZDI-21-867",
         },
         {
            date: "2021-07-13T00:00:00",
            db: "VULMON",
            id: "CVE-2021-34329",
         },
         {
            date: "2022-04-19T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-009276",
         },
         {
            date: "2021-07-13T11:15:13.173000",
            db: "NVD",
            id: "CVE-2021-34329",
         },
         {
            date: "2021-07-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202107-925",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-07-19T00:00:00",
            db: "ZDI",
            id: "ZDI-21-867",
         },
         {
            date: "2022-10-07T00:00:00",
            db: "VULMON",
            id: "CVE-2021-34329",
         },
         {
            date: "2022-04-19T09:26:00",
            db: "JVNDB",
            id: "JVNDB-2021-009276",
         },
         {
            date: "2022-10-07T20:47:19.807000",
            db: "NVD",
            id: "CVE-2021-34329",
         },
         {
            date: "2022-10-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202107-925",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202107-925",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Out-of-bounds write vulnerabilities in multiple Siemens products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-009276",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202107-925",
         },
      ],
      trust: 0.6,
   },
}

var-202103-1586
Vulnerability from variot

A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing DFT files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12049). Zero Day Initiative To this vulnerability ZDI-CAN-12049 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DFT files

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202103-1586",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2021mp4",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2020mp13",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-275",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016317",
         },
         {
            db: "NVD",
            id: "CVE-2020-28385",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2020",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack10:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack11:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack12:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack8:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack9:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28385",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "rgod",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-275",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2020-28385",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2020-28385",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-28385",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-28385",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-28385",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-28385",
                  trust: 1.8,
                  value: "High",
               },
               {
                  author: "ZDI",
                  id: "CVE-2020-28385",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202103-698",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-28385",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-275",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28385",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016317",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-698",
         },
         {
            db: "NVD",
            id: "CVE-2020-28385",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing DFT files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12049). Zero Day Initiative To this vulnerability ZDI-CAN-12049 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DFT files",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28385",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016317",
         },
         {
            db: "ZDI",
            id: "ZDI-21-275",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28385",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-28385",
            trust: 3.2,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-103-06",
            trust: 2.5,
         },
         {
            db: "SIEMENS",
            id: "SSA-574442",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-715184",
            trust: 1.7,
         },
         {
            db: "ZDI",
            id: "ZDI-21-275",
            trust: 1.4,
         },
         {
            db: "JVN",
            id: "JVNVU93441670",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU96269392",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016317",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-12049",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1244",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0854",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-068-09",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-698",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-28385",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-275",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28385",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016317",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-698",
         },
         {
            db: "NVD",
            id: "CVE-2020-28385",
         },
      ],
   },
   id: "VAR-202103-1586",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-04T07:56:49.363000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-574442 Siemens Security Advisory",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-574442.pdf",
         },
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-09",
         },
         {
            title: "Siemens Solid Edge Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=144059",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=1b3f65b08c80e38048cc09f548b68a84",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=eaf7ce45c295beb8a23b24ef0efbaa1c",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-275",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28385",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016317",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-698",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 2,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [ Other ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-016317",
         },
         {
            db: "NVD",
            id: "CVE-2020-28385",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.1,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-06",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-574442.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-28385",
         },
         {
            trust: 1.3,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-09",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu93441670/",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu96269392/",
         },
         {
            trust: 0.7,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-275/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1244",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0854",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/787.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-275",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28385",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016317",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-698",
         },
         {
            db: "NVD",
            id: "CVE-2020-28385",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-275",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28385",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-016317",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-698",
         },
         {
            db: "NVD",
            id: "CVE-2020-28385",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-03-11T00:00:00",
            db: "ZDI",
            id: "ZDI-21-275",
         },
         {
            date: "2021-03-15T00:00:00",
            db: "VULMON",
            id: "CVE-2020-28385",
         },
         {
            date: "2021-11-22T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-016317",
         },
         {
            date: "2021-03-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202103-698",
         },
         {
            date: "2021-03-15T17:15:00",
            db: "NVD",
            id: "CVE-2020-28385",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-03-11T00:00:00",
            db: "ZDI",
            id: "ZDI-21-275",
         },
         {
            date: "2021-04-22T00:00:00",
            db: "VULMON",
            id: "CVE-2020-28385",
         },
         {
            date: "2021-11-22T09:06:00",
            db: "JVNDB",
            id: "JVNDB-2020-016317",
         },
         {
            date: "2021-06-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202103-698",
         },
         {
            date: "2021-12-10T21:36:00",
            db: "NVD",
            id: "CVE-2020-28385",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202103-698",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Solid Edge  Out-of-bounds Vulnerability in Microsoft",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-016317",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202103-698",
         },
      ],
      trust: 0.6,
   },
}

var-202103-1585
Vulnerability from variot

A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12532). Zero Day Initiative To this vulnerability ZDI-CAN-12532 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202103-1585",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2021mp4",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2020mp13",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-274",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004476",
         },
         {
            db: "NVD",
            id: "CVE-2021-27380",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2020",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack10:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack11:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack12:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack8:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack9:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-27380",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Francis Provencher {PRL}",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-274",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2021-27380",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2021-27380",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-27380",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-27380",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-27380",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-27380",
                  trust: 1.8,
                  value: "High",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-27380",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202103-697",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-27380",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-274",
         },
         {
            db: "VULMON",
            id: "CVE-2021-27380",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004476",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-697",
         },
         {
            db: "NVD",
            id: "CVE-2021-27380",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12532). Zero Day Initiative To this vulnerability ZDI-CAN-12532 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-27380",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004476",
         },
         {
            db: "ZDI",
            id: "ZDI-21-274",
         },
         {
            db: "VULMON",
            id: "CVE-2021-27380",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-27380",
            trust: 3.2,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-103-06",
            trust: 2.5,
         },
         {
            db: "SIEMENS",
            id: "SSA-574442",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-715184",
            trust: 1.7,
         },
         {
            db: "ZDI",
            id: "ZDI-21-274",
            trust: 1.4,
         },
         {
            db: "JVN",
            id: "JVNVU93441670",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU96269392",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004476",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-12532",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1244",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0854",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-068-09",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-697",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-27380",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-274",
         },
         {
            db: "VULMON",
            id: "CVE-2021-27380",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004476",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-697",
         },
         {
            db: "NVD",
            id: "CVE-2021-27380",
         },
      ],
   },
   id: "VAR-202103-1585",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-04T06:53:34.594000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-574442 Siemens Security Advisory",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-574442.pdf",
         },
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-09",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=1b3f65b08c80e38048cc09f548b68a84",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=eaf7ce45c295beb8a23b24ef0efbaa1c",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-274",
         },
         {
            db: "VULMON",
            id: "CVE-2021-27380",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004476",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [ Other ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-004476",
         },
         {
            db: "NVD",
            id: "CVE-2021-27380",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.1,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-06",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-574442.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-27380",
         },
         {
            trust: 1.3,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-09",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu93441670/",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu96269392/",
         },
         {
            trust: 0.7,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-274/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1244",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0854",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/787.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-574442.txt",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-274",
         },
         {
            db: "VULMON",
            id: "CVE-2021-27380",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004476",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-697",
         },
         {
            db: "NVD",
            id: "CVE-2021-27380",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-274",
         },
         {
            db: "VULMON",
            id: "CVE-2021-27380",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004476",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-697",
         },
         {
            db: "NVD",
            id: "CVE-2021-27380",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-03-11T00:00:00",
            db: "ZDI",
            id: "ZDI-21-274",
         },
         {
            date: "2021-03-15T00:00:00",
            db: "VULMON",
            id: "CVE-2021-27380",
         },
         {
            date: "2021-11-22T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-004476",
         },
         {
            date: "2021-03-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202103-697",
         },
         {
            date: "2021-03-15T17:15:00",
            db: "NVD",
            id: "CVE-2021-27380",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-03-11T00:00:00",
            db: "ZDI",
            id: "ZDI-21-274",
         },
         {
            date: "2021-04-22T00:00:00",
            db: "VULMON",
            id: "CVE-2021-27380",
         },
         {
            date: "2021-11-22T09:03:00",
            db: "JVNDB",
            id: "JVNDB-2021-004476",
         },
         {
            date: "2021-06-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202103-697",
         },
         {
            date: "2021-12-10T21:32:00",
            db: "NVD",
            id: "CVE-2021-27380",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202103-697",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Solid Edge  Out-of-bounds Vulnerability in Microsoft",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-004476",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202103-697",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0153
Vulnerability from variot

A vulnerability has been identified in JT2Go (All versions < V13.2.0.7), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V13.1 (All versions < V13.1.0.9), Teamcenter Visualization V13.2 (All versions < V13.2.0.7), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15053). Zero Day Initiative To this vulnerability ZDI-CAN-15053 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0153",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.3.0.1",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "13.1.0",
         },
         {
            model: "jt2go",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0.7",
         },
         {
            model: "teamcenter visualization",
            scope: "gte",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0.7",
         },
         {
            model: "teamcenter visualization",
            scope: "gte",
            trust: 1,
            vendor: "siemens",
            version: "13.3.0",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2022",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.2.0.7",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.1.0.9",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.3.0.1",
         },
         {
            model: "solid edge",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-335",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-018312",
         },
         {
            db: "NVD",
            id: "CVE-2021-44000",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.3.0.1",
                        versionStartIncluding: "13.3.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:13.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2022:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack8:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0.7",
                        versionStartIncluding: "13.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0.7",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-44000",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Mat Powell of Trend Micro Zero Day Initiative",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-335",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-809",
         },
      ],
      trust: 1.3,
   },
   cve: "CVE-2021-44000",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-44000",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-44000",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-44000",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-44000",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-44000",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-809",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-335",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-018312",
         },
         {
            db: "NVD",
            id: "CVE-2021-44000",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-809",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in JT2Go (All versions < V13.2.0.7), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V13.1 (All versions < V13.1.0.9), Teamcenter Visualization V13.2 (All versions < V13.2.0.7), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15053). Zero Day Initiative To this vulnerability ZDI-CAN-15053 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-44000",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-018312",
         },
         {
            db: "ZDI",
            id: "ZDI-22-335",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-44000",
            trust: 3.9,
         },
         {
            db: "ZDI",
            id: "ZDI-22-335",
            trust: 3.1,
         },
         {
            db: "SIEMENS",
            id: "SSA-301589",
            trust: 1.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-041-07",
            trust: 1.4,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-018312",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-15053",
            trust: 0.7,
         },
         {
            db: "CS-HELP",
            id: "SB2022021110",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-809",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-335",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-018312",
         },
         {
            db: "NVD",
            id: "CVE-2021-44000",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-809",
         },
      ],
   },
   id: "VAR-202202-0153",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.15799868,
   },
   last_update_date: "2023-12-18T11:26:01.358000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-301589",
            trust: 1.5,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-301589.pdf",
         },
         {
            title: "Siemens Solid Edge Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185272",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-335",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-018312",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-809",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-018312",
         },
         {
            db: "NVD",
            id: "CVE-2021-44000",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3,
            url: "https://www.zerodayinitiative.com/advisories/zdi-22-335/",
         },
         {
            trust: 2.3,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-301589.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-44000",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/index.html",
         },
         {
            trust: 0.8,
            url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-041-07",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022021110",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-041-07-1",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-041-07-0",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-335",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-018312",
         },
         {
            db: "NVD",
            id: "CVE-2021-44000",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-809",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-22-335",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-018312",
         },
         {
            db: "NVD",
            id: "CVE-2021-44000",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-809",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-15T00:00:00",
            db: "ZDI",
            id: "ZDI-22-335",
         },
         {
            date: "2023-05-16T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-018312",
         },
         {
            date: "2022-02-09T16:15:14.107000",
            db: "NVD",
            id: "CVE-2021-44000",
         },
         {
            date: "2022-02-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-809",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-15T00:00:00",
            db: "ZDI",
            id: "ZDI-22-335",
         },
         {
            date: "2023-05-16T08:56:00",
            db: "JVNDB",
            id: "JVNDB-2021-018312",
         },
         {
            date: "2022-06-14T10:15:18.087000",
            db: "NVD",
            id: "CVE-2021-44000",
         },
         {
            date: "2022-06-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-809",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-809",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Out-of-bounds write vulnerabilities in multiple Siemens products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-018312",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-809",
         },
      ],
      trust: 0.6,
   },
}

var-202109-1794
Vulnerability from variot

A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13565). This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JT files. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1794",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "nx 1984",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1984",
         },
         {
            model: "nx 1988",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1984",
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1117",
         },
         {
            db: "NVD",
            id: "CVE-2021-41533",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1984_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1984",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1984:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1984_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1984",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1984:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1988_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1984",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1988:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1988_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1984",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1988:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41533",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "xina1i",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1117",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1831",
         },
      ],
      trust: 1.3,
   },
   cve: "CVE-2021-41533",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2021-41533",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.1,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41533",
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41533",
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-41533",
                  trust: 1,
                  value: "LOW",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-41533",
                  trust: 0.7,
                  value: "LOW",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202109-1831",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-41533",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1117",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41533",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1831",
         },
         {
            db: "NVD",
            id: "CVE-2021-41533",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13565). This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JT files. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41533",
         },
         {
            db: "ZDI",
            id: "ZDI-21-1117",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41533",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-41533",
            trust: 2.4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-1117",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-728618",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-740908",
            trust: 1.6,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-13565",
            trust: 0.7,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021111006",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021092905",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3454",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-287-06",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-315-12",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1831",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-41533",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1117",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41533",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1831",
         },
         {
            db: "NVD",
            id: "CVE-2021-41533",
         },
      ],
   },
   id: "VAR-202109-1794",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-05T07:08:08.659000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "",
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            title: "Siemens Solid Edge Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=164361",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=3b85ee03e935aff52e55e7402b3926a1",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1117",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41533",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1831",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-125",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41533",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-1117/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-740908.pdf",
         },
         {
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-287-06",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-41533",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3454",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021092905",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-315-12",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021111006",
         },
         {
            trust: 0.2,
            url: "https://cwe.mitre.org/data/definitions/125.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1117",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41533",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1831",
         },
         {
            db: "NVD",
            id: "CVE-2021-41533",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-1117",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41533",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1831",
         },
         {
            db: "NVD",
            id: "CVE-2021-41533",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1117",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41533",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1831",
         },
         {
            date: "2021-09-28T12:15:00",
            db: "NVD",
            id: "CVE-2021-41533",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1117",
         },
         {
            date: "2021-10-01T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41533",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-11-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1831",
         },
         {
            date: "2021-11-28T23:29:00",
            db: "NVD",
            id: "CVE-2021-41533",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-1831",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens Solid Edge Viewer JT File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1117",
         },
      ],
      trust: 0.7,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202109-1825
Vulnerability from variot

A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The plmxmlAdapterIFC.dll contains an out-of-bounds read while parsing user supplied IFC files which could result in a read past the end of an allocated buffer. This could allow an attacker to cause a denial-of-service condition or read sensitive information from memory locations. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1825",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "nx 1980",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1984",
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-37203",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:nx_1980:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1984",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-37203",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Xina1i and Trend Micro’s Zero Day Initiative reported these vulnerabilities to Siemens and CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-937",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2021-37203",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2021-37203",
                  impactScore: 4.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.1,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.1,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-37203",
                  impactScore: 5.2,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
                  version: "3.1",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-37203",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202109-937",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-37203",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2021-37203",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-937",
         },
         {
            db: "NVD",
            id: "CVE-2021-37203",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The plmxmlAdapterIFC.dll contains an out-of-bounds read while parsing user supplied IFC files which could result in a read past the end of an allocated buffer. This could allow an attacker to cause a denial-of-service condition or read sensitive information from memory locations. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-37203",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-37203",
         },
      ],
      trust: 1.53,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "SIEMENS",
            id: "SSA-728618",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-208530",
            trust: 1.7,
         },
         {
            db: "NVD",
            id: "CVE-2021-37203",
            trust: 1.7,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-287-06",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-257-09",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021092905",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021091517",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3454",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-937",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-37203",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2021-37203",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-937",
         },
         {
            db: "NVD",
            id: "CVE-2021-37203",
         },
      ],
   },
   id: "VAR-202109-1825",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-04T07:23:12.491000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Siemens NX Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=164124",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=332f5edc8b55cb21d1b9cbee1c6ab360",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=3b85ee03e935aff52e55e7402b3926a1",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2021-37203",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-937",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-125",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-37203",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-208530.pdf",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-287-06",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021091517",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3454",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-37203",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-257-09",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021092905",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/125.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-208530.txt",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2021-37203",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-937",
         },
         {
            db: "NVD",
            id: "CVE-2021-37203",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2021-37203",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-937",
         },
         {
            db: "NVD",
            id: "CVE-2021-37203",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-14T00:00:00",
            db: "VULMON",
            id: "CVE-2021-37203",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-09-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-937",
         },
         {
            date: "2021-09-14T11:15:00",
            db: "NVD",
            id: "CVE-2021-37203",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-28T00:00:00",
            db: "VULMON",
            id: "CVE-2021-37203",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-10-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-937",
         },
         {
            date: "2021-11-18T16:08:00",
            db: "NVD",
            id: "CVE-2021-37203",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-937",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Pillow Buffer error vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202101-1948
Vulnerability from variot

A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could lead to a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. Solid Edge Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Solid Edge is a combination of software tools to solve various product development processes

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1948",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2021mp2",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2020mp12",
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
         {
            model: "solid edge <se2021mp2",
            scope: null,
            trust: 0.6,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-076",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02632",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015354",
         },
         {
            db: "NVD",
            id: "CVE-2020-28384",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2020",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack10:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack11:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack8:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack9:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28384",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "rgod",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-076",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2020-28384",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2020-28384",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "CNVD-2021-02632",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-28384",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-28384",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-28384",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2020-28384",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2021-02632",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202101-837",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-076",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02632",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015354",
         },
         {
            db: "NVD",
            id: "CVE-2020-28384",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-837",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could lead to a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. Solid Edge Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Solid Edge is a combination of software tools to solve various product development processes",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28384",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015354",
         },
         {
            db: "ZDI",
            id: "ZDI-21-076",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02632",
         },
      ],
      trust: 2.79,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-28384",
            trust: 3.7,
         },
         {
            db: "ZDI",
            id: "ZDI-21-076",
            trust: 3.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-012-04",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-979834",
            trust: 2.2,
         },
         {
            db: "ZDI",
            id: "ZDI-21-055",
            trust: 1.6,
         },
         {
            db: "JVN",
            id: "JVNVU91685542",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015354",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-11922",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02632",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0126",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-837",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-076",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02632",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015354",
         },
         {
            db: "NVD",
            id: "CVE-2020-28384",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-837",
         },
      ],
   },
   id: "VAR-202101-1948",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-02632",
         },
      ],
      trust: 0.06,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "IoT",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-02632",
         },
      ],
   },
   last_update_date: "2023-12-18T11:19:50.700000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-979834",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
         },
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-04",
         },
         {
            title: "Patch for Solid Edge stack buffer overflow",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/244048",
         },
         {
            title: "Siemens Solid Edge Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139507",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-076",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02632",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015354",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-837",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015354",
         },
         {
            db: "NVD",
            id: "CVE-2020-28384",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-04",
         },
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-076/",
         },
         {
            trust: 2.2,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
         },
         {
            trust: 1.6,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-055/",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-28384",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu91685542/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0126/",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-076",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02632",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015354",
         },
         {
            db: "NVD",
            id: "CVE-2020-28384",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-837",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-076",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02632",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015354",
         },
         {
            db: "NVD",
            id: "CVE-2020-28384",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-837",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-01-20T00:00:00",
            db: "ZDI",
            id: "ZDI-21-076",
         },
         {
            date: "2021-01-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-02632",
         },
         {
            date: "2021-09-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-015354",
         },
         {
            date: "2021-01-12T21:15:17.917000",
            db: "NVD",
            id: "CVE-2020-28384",
         },
         {
            date: "2021-01-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202101-837",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-01-20T00:00:00",
            db: "ZDI",
            id: "ZDI-21-076",
         },
         {
            date: "2021-01-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-02632",
         },
         {
            date: "2021-09-17T05:28:00",
            db: "JVNDB",
            id: "JVNDB-2020-015354",
         },
         {
            date: "2021-12-10T21:45:27.490000",
            db: "NVD",
            id: "CVE-2020-28384",
         },
         {
            date: "2021-02-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202101-837",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202101-837",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Solid Edge  Out-of-bounds Vulnerability in Microsoft",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015354",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202101-837",
         },
      ],
      trust: 0.6,
   },
}

var-202101-1949
Vulnerability from variot

A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in a out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. Solid Edge Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Solid Edge is a combination of software tools to solve various product development processes

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1949",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2021mp2",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2020mp12",
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
         {
            model: "solid edge <se2021mp2",
            scope: null,
            trust: 0.6,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-075",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02633",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015353",
         },
         {
            db: "NVD",
            id: "CVE-2020-28382",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2020",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack10:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack11:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack8:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack9:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28382",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "rgod",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-075",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2020-28382",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2020-28382",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "CNVD-2021-02633",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-28382",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-28382",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-28382",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2020-28382",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2021-02633",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202101-920",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-28382",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-075",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02633",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28382",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015353",
         },
         {
            db: "NVD",
            id: "CVE-2020-28382",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-920",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in a out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. Solid Edge Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Solid Edge is a combination of software tools to solve various product development processes",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28382",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015353",
         },
         {
            db: "ZDI",
            id: "ZDI-21-075",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02633",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28382",
         },
      ],
      trust: 2.88,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-28382",
            trust: 3.8,
         },
         {
            db: "ZDI",
            id: "ZDI-21-075",
            trust: 3.2,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-012-04",
            trust: 2.5,
         },
         {
            db: "SIEMENS",
            id: "SSA-979834",
            trust: 2.3,
         },
         {
            db: "ZDI",
            id: "ZDI-21-052",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU91685542",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015353",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-11920",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02633",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0126",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-920",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-28382",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-075",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02633",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28382",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015353",
         },
         {
            db: "NVD",
            id: "CVE-2020-28382",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-920",
         },
      ],
   },
   id: "VAR-202101-1949",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-02633",
         },
      ],
      trust: 0.06,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "IoT",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-02633",
         },
      ],
   },
   last_update_date: "2023-12-18T10:53:21.168000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-979834",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
         },
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-04",
         },
         {
            title: "Patch for Solid Edge has an unspecified vulnerability (CNVD-2021-02633)",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/244042",
         },
         {
            title: "Siemens Solid Edge Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139395",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=c7a8d89e21dabfae50698a81e4d34e99",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-075",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02633",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28382",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015353",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-920",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015353",
         },
         {
            db: "NVD",
            id: "CVE-2020-28382",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.8,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-04",
         },
         {
            trust: 2.6,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-075/",
         },
         {
            trust: 2.3,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
         },
         {
            trust: 1.7,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-052/",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-28382",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu91685542/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0126/",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/787.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-075",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02633",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28382",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015353",
         },
         {
            db: "NVD",
            id: "CVE-2020-28382",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-920",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-075",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02633",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28382",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015353",
         },
         {
            db: "NVD",
            id: "CVE-2020-28382",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-920",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-01-20T00:00:00",
            db: "ZDI",
            id: "ZDI-21-075",
         },
         {
            date: "2021-01-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-02633",
         },
         {
            date: "2021-01-12T00:00:00",
            db: "VULMON",
            id: "CVE-2020-28382",
         },
         {
            date: "2021-09-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-015353",
         },
         {
            date: "2021-01-12T21:15:17.760000",
            db: "NVD",
            id: "CVE-2020-28382",
         },
         {
            date: "2021-01-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202101-920",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-01-20T00:00:00",
            db: "ZDI",
            id: "ZDI-21-075",
         },
         {
            date: "2021-01-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-02633",
         },
         {
            date: "2021-07-15T00:00:00",
            db: "VULMON",
            id: "CVE-2020-28382",
         },
         {
            date: "2021-09-17T05:28:00",
            db: "JVNDB",
            id: "JVNDB-2020-015353",
         },
         {
            date: "2021-12-10T21:46:34.540000",
            db: "NVD",
            id: "CVE-2020-28382",
         },
         {
            date: "2021-02-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202101-920",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202101-920",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Solid Edge  Out-of-bounds Vulnerability in Microsoft",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015353",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202101-920",
         },
      ],
      trust: 0.6,
   },
}

var-202107-1421
Vulnerability from variot

A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter Visualization (All versions < V13.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13422). Zero Day Initiative To this vulnerability ZDI-CAN-13422 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1421",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "jt2go",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.2",
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-864",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009279",
         },
         {
            db: "NVD",
            id: "CVE-2021-34326",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-34326",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Mat Powell of Trend Micro Zero Day Initiative",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-864",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-923",
         },
      ],
      trust: 1.3,
   },
   cve: "CVE-2021-34326",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-34326",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-34326",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-34326",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-34326",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-34326",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202107-923",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-34326",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-864",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34326",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009279",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-923",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "NVD",
            id: "CVE-2021-34326",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter Visualization (All versions < V13.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13422). Zero Day Initiative To this vulnerability ZDI-CAN-13422 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-34326",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009279",
         },
         {
            db: "ZDI",
            id: "ZDI-21-864",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34326",
         },
      ],
      trust: 2.88,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-34326",
            trust: 4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-864",
            trust: 3.2,
         },
         {
            db: "SIEMENS",
            id: "SSA-173615",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-483182",
            trust: 1.7,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009279",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-13422",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2403",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021071508",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-923",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-34326",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-864",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34326",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009279",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-923",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "NVD",
            id: "CVE-2021-34326",
         },
      ],
   },
   id: "VAR-202107-1421",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.15799868,
   },
   last_update_date: "2024-04-26T10:58:15.919000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-173615 Siemens Security Advisory",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf",
         },
         {
            title: "",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-15https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf",
         },
         {
            title: "Siemens Jt2go  and  Siemens Teamcenter Visualization Security vulnerabilities",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=156616",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=e172da356a059f9e1b4ef7215ce64ef1",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=aa85c53444a3e0726ddb55922c9060c8",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-864",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34326",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009279",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-923",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-009279",
         },
         {
            db: "NVD",
            id: "CVE-2021-34326",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.1,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-864/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-34326",
         },
         {
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-15https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021071508",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2403",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/20.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-864",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34326",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009279",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-923",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "NVD",
            id: "CVE-2021-34326",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-864",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34326",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009279",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-923",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "NVD",
            id: "CVE-2021-34326",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-07-19T00:00:00",
            db: "ZDI",
            id: "ZDI-21-864",
         },
         {
            date: "2021-07-13T00:00:00",
            db: "VULMON",
            id: "CVE-2021-34326",
         },
         {
            date: "2022-04-19T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-009279",
         },
         {
            date: "2021-07-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202107-923",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-07-13T11:15:12.927000",
            db: "NVD",
            id: "CVE-2021-34326",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-07-19T00:00:00",
            db: "ZDI",
            id: "ZDI-21-864",
         },
         {
            date: "2021-07-19T00:00:00",
            db: "VULMON",
            id: "CVE-2021-34326",
         },
         {
            date: "2024-04-11T05:59:00",
            db: "JVNDB",
            id: "JVNDB-2021-009279",
         },
         {
            date: "2022-10-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202107-923",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2022-10-27T12:23:58.637000",
            db: "NVD",
            id: "CVE-2021-34326",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202107-923",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Out-of-bounds write vulnerabilities in multiple Siemens products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-009279",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202107-923",
         },
      ],
      trust: 0.6,
   },
}

var-202107-1423
Vulnerability from variot

A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter Visualization (All versions < V13.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13424). Zero Day Initiative To this vulnerability ZDI-CAN-13424 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1423",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "jt2go",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.2",
         },
         {
            model: "solid edge",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-866",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009277",
         },
         {
            db: "NVD",
            id: "CVE-2021-34328",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-34328",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Mat Powell of Trend Micro Zero Day Initiative",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-866",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2021-34328",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-34328",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-34328",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-34328",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-34328",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-34328",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202107-926",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-34328",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-866",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34328",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009277",
         },
         {
            db: "NVD",
            id: "CVE-2021-34328",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-926",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter Visualization (All versions < V13.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13424). Zero Day Initiative To this vulnerability  ZDI-CAN-13424 Was numbered.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-34328",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009277",
         },
         {
            db: "ZDI",
            id: "ZDI-21-866",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34328",
         },
      ],
      trust: 2.88,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-34328",
            trust: 4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-866",
            trust: 3.2,
         },
         {
            db: "SIEMENS",
            id: "SSA-173615",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-483182",
            trust: 1.7,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009277",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-13424",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2403",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021071508",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-194-15",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-926",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-34328",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-866",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34328",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009277",
         },
         {
            db: "NVD",
            id: "CVE-2021-34328",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-926",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   id: "VAR-202107-1423",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.15799868,
   },
   last_update_date: "2023-12-18T10:44:02.528000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-173615 Siemens Security Advisory",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf",
         },
         {
            title: "",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-15https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf",
         },
         {
            title: "Siemens Jt2go  and  Siemens Teamcenter Visualization Security vulnerabilities",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=156619",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=e172da356a059f9e1b4ef7215ce64ef1",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=aa85c53444a3e0726ddb55922c9060c8",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2021-34328 ",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-866",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34328",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009277",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-926",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Incorrect input confirmation (CWE-20) [NVD Evaluation ]",
            trust: 0.8,
         },
         {
            problemtype: " Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-009277",
         },
         {
            db: "NVD",
            id: "CVE-2021-34328",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.2,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-866/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-34328",
         },
         {
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-15https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021071508",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2403",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-15",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/787.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2021-34328",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-866",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34328",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009277",
         },
         {
            db: "NVD",
            id: "CVE-2021-34328",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-926",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-866",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34328",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009277",
         },
         {
            db: "NVD",
            id: "CVE-2021-34328",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-926",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-07-19T00:00:00",
            db: "ZDI",
            id: "ZDI-21-866",
         },
         {
            date: "2021-07-13T00:00:00",
            db: "VULMON",
            id: "CVE-2021-34328",
         },
         {
            date: "2022-04-19T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-009277",
         },
         {
            date: "2021-07-13T11:15:13.087000",
            db: "NVD",
            id: "CVE-2021-34328",
         },
         {
            date: "2021-07-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202107-926",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-07-19T00:00:00",
            db: "ZDI",
            id: "ZDI-21-866",
         },
         {
            date: "2022-10-07T00:00:00",
            db: "VULMON",
            id: "CVE-2021-34328",
         },
         {
            date: "2022-04-19T09:29:00",
            db: "JVNDB",
            id: "JVNDB-2021-009277",
         },
         {
            date: "2022-10-07T20:47:23.320000",
            db: "NVD",
            id: "CVE-2021-34328",
         },
         {
            date: "2022-10-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202107-926",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202107-926",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Out-of-bounds write vulnerabilities in multiple Siemens products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-009277",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202107-926",
         },
      ],
      trust: 0.6,
   },
}

var-202109-1121
Vulnerability from variot

A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13773). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of OBJ files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1121",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1123",
         },
         {
            db: "NVD",
            id: "CVE-2021-41539",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41539",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "xina1i",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1123",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1842",
         },
      ],
      trust: 1.3,
   },
   cve: "CVE-2021-41539",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2021-41539",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.1,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41539",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41539",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-41539",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-41539",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202109-1842",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-41539",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1123",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41539",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1842",
         },
         {
            db: "NVD",
            id: "CVE-2021-41539",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13773). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of OBJ files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41539",
         },
         {
            db: "ZDI",
            id: "ZDI-21-1123",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41539",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-41539",
            trust: 2.4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-1123",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-728618",
            trust: 1.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-13773",
            trust: 0.7,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-287-06",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021092905",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3454",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1842",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-41539",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1123",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41539",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1842",
         },
         {
            db: "NVD",
            id: "CVE-2021-41539",
         },
      ],
   },
   id: "VAR-202109-1121",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-04T07:11:58.756000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "",
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            title: "Siemens Solid Edge Remediation of resource management error vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=164370",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=3b85ee03e935aff52e55e7402b3926a1",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1123",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41539",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1842",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-416",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41539",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-1123/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-287-06",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3454",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021092905",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-41539",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/416.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1123",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41539",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1842",
         },
         {
            db: "NVD",
            id: "CVE-2021-41539",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-1123",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41539",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1842",
         },
         {
            db: "NVD",
            id: "CVE-2021-41539",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1123",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41539",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1842",
         },
         {
            date: "2021-09-28T12:15:00",
            db: "NVD",
            id: "CVE-2021-41539",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1123",
         },
         {
            date: "2021-10-01T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41539",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-10-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1842",
         },
         {
            date: "2021-10-01T13:53:00",
            db: "NVD",
            id: "CVE-2021-41539",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-1842",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens Solid Edge Viewer OBJ File Parsing Use-After-Free Remote Code Execution Vulnerability",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1123",
         },
      ],
      trust: 0.7,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202109-1793
Vulnerability from variot

A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13703). This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JT files. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1793",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "nx 1984",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1984",
         },
         {
            model: "nx 1988",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1984",
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1118",
         },
         {
            db: "NVD",
            id: "CVE-2021-41534",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1984_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1984",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1984:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1984_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1984",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1984:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1988_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1984",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1988:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1988_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1984",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1988:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41534",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "xina1i",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1118",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1838",
         },
      ],
      trust: 1.3,
   },
   cve: "CVE-2021-41534",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2021-41534",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.1,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41534",
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41534",
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-41534",
                  trust: 1,
                  value: "LOW",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-41534",
                  trust: 0.7,
                  value: "LOW",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202109-1838",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-41534",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1118",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41534",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1838",
         },
         {
            db: "NVD",
            id: "CVE-2021-41534",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13703). This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JT files. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41534",
         },
         {
            db: "ZDI",
            id: "ZDI-21-1118",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41534",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-41534",
            trust: 2.4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-1118",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-728618",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-740908",
            trust: 1.6,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-13703",
            trust: 0.7,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021111006",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021092905",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3454",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-287-06",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-315-12",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1838",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-41534",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1118",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41534",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1838",
         },
         {
            db: "NVD",
            id: "CVE-2021-41534",
         },
      ],
   },
   id: "VAR-202109-1793",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-04T08:13:30.769000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "",
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            title: "Siemens Solid Edge Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=170202",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=3b85ee03e935aff52e55e7402b3926a1",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1118",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41534",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1838",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-125",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41534",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-1118/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-740908.pdf",
         },
         {
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-287-06",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-41534",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3454",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021092905",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-315-12",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021111006",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/125.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1118",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41534",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1838",
         },
         {
            db: "NVD",
            id: "CVE-2021-41534",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-1118",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41534",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1838",
         },
         {
            db: "NVD",
            id: "CVE-2021-41534",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1118",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41534",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1838",
         },
         {
            date: "2021-09-28T12:15:00",
            db: "NVD",
            id: "CVE-2021-41534",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1118",
         },
         {
            date: "2021-10-01T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41534",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-11-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1838",
         },
         {
            date: "2021-11-28T23:29:00",
            db: "NVD",
            id: "CVE-2021-41534",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-1838",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens Solid Edge Viewer JT File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1118",
         },
      ],
      trust: 0.7,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202109-1826
Vulnerability from variot

A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The IFC adapter in affected application contains a use-after-free vulnerability that could be triggered while parsing user-supplied IFC files. An attacker could leverage this vulnerability to execute code in the context of the current process. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1826",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "nx 1980",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1984",
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-37202",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:nx_1980:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1984",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-37202",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Xina1i and Trend Micro’s Zero Day Initiative reported these vulnerabilities to Siemens and CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-938",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2021-37202",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2021-37202",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.1,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-37202",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-37202",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202109-938",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-37202",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2021-37202",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-938",
         },
         {
            db: "NVD",
            id: "CVE-2021-37202",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The IFC adapter in affected application contains a use-after-free vulnerability that could be triggered while parsing user-supplied IFC files. An attacker could leverage this vulnerability to execute code in the context of the current process. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-37202",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-37202",
         },
      ],
      trust: 1.53,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "SIEMENS",
            id: "SSA-728618",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-208530",
            trust: 1.7,
         },
         {
            db: "NVD",
            id: "CVE-2021-37202",
            trust: 1.7,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-287-06",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-257-09",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021092905",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021091517",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3454",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-938",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-37202",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2021-37202",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-938",
         },
         {
            db: "NVD",
            id: "CVE-2021-37202",
         },
      ],
   },
   id: "VAR-202109-1826",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-04T08:28:05.251000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Siemens NX Remediation of resource management error vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=164125",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=332f5edc8b55cb21d1b9cbee1c6ab360",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=3b85ee03e935aff52e55e7402b3926a1",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2021-37202",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-938",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-416",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-37202",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-208530.pdf",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-287-06",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021091517",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3454",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-37202",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-257-09",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021092905",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/416.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-208530.txt",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2021-37202",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-938",
         },
         {
            db: "NVD",
            id: "CVE-2021-37202",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2021-37202",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-938",
         },
         {
            db: "NVD",
            id: "CVE-2021-37202",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-14T00:00:00",
            db: "VULMON",
            id: "CVE-2021-37202",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-09-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-938",
         },
         {
            date: "2021-09-14T11:15:00",
            db: "NVD",
            id: "CVE-2021-37202",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-28T00:00:00",
            db: "VULMON",
            id: "CVE-2021-37202",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-10-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-938",
         },
         {
            date: "2021-11-18T16:08:00",
            db: "NVD",
            id: "CVE-2021-37202",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-938",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Pillow Buffer error vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202103-0922
Vulnerability from variot

A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds read past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12534). Zero Day Initiative To this vulnerability ZDI-CAN-12534 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0922",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2021mp3",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2020mp13",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-270",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004477",
         },
         {
            db: "NVD",
            id: "CVE-2021-27381",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-27381",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Francis Provencher {PRL}",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-270",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2021-27381",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-27381",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 1.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-27381",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-27381",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-27381",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-27381",
                  trust: 1.8,
                  value: "High",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-27381",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202103-695",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-270",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004477",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-695",
         },
         {
            db: "NVD",
            id: "CVE-2021-27381",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds read past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12534). Zero Day Initiative To this vulnerability ZDI-CAN-12534 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-27381",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004477",
         },
         {
            db: "ZDI",
            id: "ZDI-21-270",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-27381",
            trust: 3.1,
         },
         {
            db: "SIEMENS",
            id: "SSA-715184",
            trust: 1.6,
         },
         {
            db: "ZDI",
            id: "ZDI-21-270",
            trust: 1.3,
         },
         {
            db: "JVN",
            id: "JVNVU93441670",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004477",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-12534",
            trust: 0.7,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-068-09",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0854",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-695",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-270",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004477",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-695",
         },
         {
            db: "NVD",
            id: "CVE-2021-27381",
         },
      ],
   },
   id: "VAR-202103-0922",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-04T06:52:37.767000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-715184",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf",
         },
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-09",
         },
         {
            title: "Siemens Solid Edge Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=144545",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-270",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004477",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-695",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-125",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds read (CWE-125) [ Other ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-004477",
         },
         {
            db: "NVD",
            id: "CVE-2021-27381",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-27381",
         },
         {
            trust: 1.3,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-09",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu93441670/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0854",
         },
         {
            trust: 0.6,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-270/",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-270",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004477",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-695",
         },
         {
            db: "NVD",
            id: "CVE-2021-27381",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-270",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-004477",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202103-695",
         },
         {
            db: "NVD",
            id: "CVE-2021-27381",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-03-11T00:00:00",
            db: "ZDI",
            id: "ZDI-21-270",
         },
         {
            date: "2021-11-22T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-004477",
         },
         {
            date: "2021-03-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202103-695",
         },
         {
            date: "2021-03-15T17:15:00",
            db: "NVD",
            id: "CVE-2021-27381",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-03-12T00:00:00",
            db: "ZDI",
            id: "ZDI-21-270",
         },
         {
            date: "2021-11-22T09:03:00",
            db: "JVNDB",
            id: "JVNDB-2021-004477",
         },
         {
            date: "2021-03-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202103-695",
         },
         {
            date: "2021-07-15T18:00:00",
            db: "NVD",
            id: "CVE-2021-27381",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202103-695",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Solid Edge  Out-of-bounds read vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-004477",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202103-695",
         },
      ],
      trust: 0.6,
   },
}

var-202112-0795
Vulnerability from variot

A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains a use-after-free vulnerability that could be triggered while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15057, ZDI-CAN-19081). JT2Go and Teamcenter Visualization Exists in a vulnerability related to the use of freed memory. Zero Day Initiative To this vulnerability ZDI-CAN-15107 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0795",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "jt utilities",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.1.1.0",
         },
         {
            model: "jt open toolkit",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "11.1.1.0",
         },
         {
            model: "jt2go",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0.5",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0.5",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2023",
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.2.0.5",
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-005",
         },
         {
            db: "ZDI",
            id: "ZDI-23-090",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005656",
         },
         {
            db: "NVD",
            id: "CVE-2021-44014",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt_open_toolkit:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.1.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt_utilities:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.1.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0.5",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0.5",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2023",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-44014",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Mat Powell of Trend Micro Zero Day Initiative",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-005",
         },
         {
            db: "ZDI",
            id: "ZDI-23-090",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1205",
         },
      ],
      trust: 2,
   },
   cve: "CVE-2021-44014",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-44014",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 2,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-44014",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1.4,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-44014",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-44014",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-44014",
                  trust: 1.4,
                  value: "HIGH",
               },
               {
                  author: "productcert@siemens.com",
                  id: "CVE-2021-44014",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202112-1205",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-44014",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-005",
         },
         {
            db: "ZDI",
            id: "ZDI-23-090",
         },
         {
            db: "VULMON",
            id: "CVE-2021-44014",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005656",
         },
         {
            db: "NVD",
            id: "CVE-2021-44014",
         },
         {
            db: "NVD",
            id: "CVE-2021-44014",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1205",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains a use-after-free vulnerability that could be triggered while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15057, ZDI-CAN-19081). JT2Go and Teamcenter Visualization Exists in a vulnerability related to the use of freed memory. Zero Day Initiative To this vulnerability ZDI-CAN-15107 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-44014",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005656",
         },
         {
            db: "ZDI",
            id: "ZDI-22-005",
         },
         {
            db: "ZDI",
            id: "ZDI-23-090",
         },
         {
            db: "VULMON",
            id: "CVE-2021-44014",
         },
      ],
      trust: 2.97,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-44014",
            trust: 4.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-936212",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-595101",
            trust: 1.7,
         },
         {
            db: "ZDI",
            id: "ZDI-22-005",
            trust: 1.4,
         },
         {
            db: "JVN",
            id: "JVNVU96592426",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU90782730",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005656",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-15057",
            trust: 0.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-19081",
            trust: 0.7,
         },
         {
            db: "ZDI",
            id: "ZDI-23-090",
            trust: 0.7,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-350-10",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.4300",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2022010614",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1205",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-44014",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-005",
         },
         {
            db: "ZDI",
            id: "ZDI-23-090",
         },
         {
            db: "VULMON",
            id: "CVE-2021-44014",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005656",
         },
         {
            db: "NVD",
            id: "CVE-2021-44014",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1205",
         },
      ],
   },
   id: "VAR-202112-0795",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.15799868,
   },
   last_update_date: "2023-12-18T10:58:01.037000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-595101",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf",
         },
         {
            title: "",
            trust: 0.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdfhttps://www.cisa.gov/uscert/ics/advisories/icsa-21-350-10",
         },
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 0.7,
            url: "https://cert-portal.siemens.com/productcert/html/ssa-936212.html",
         },
         {
            title: "Siemens Jt2go Remediation of resource management error vulnerabilities",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=174920",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=39139dcd04f2a523ea449623583b65af",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-005",
         },
         {
            db: "ZDI",
            id: "ZDI-23-090",
         },
         {
            db: "VULMON",
            id: "CVE-2021-44014",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005656",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1205",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-416",
            trust: 1,
         },
         {
            problemtype: "Use of freed memory (CWE-416) [ others ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-005656",
         },
         {
            db: "NVD",
            id: "CVE-2021-44014",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-936212.pdf",
         },
         {
            trust: 1.3,
            url: "https://www.zerodayinitiative.com/advisories/zdi-22-005/",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu96592426/",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu90782730/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-44014",
         },
         {
            trust: 0.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdfhttps://www.cisa.gov/uscert/ics/advisories/icsa-21-350-10",
         },
         {
            trust: 0.7,
            url: "https://cert-portal.siemens.com/productcert/html/ssa-936212.html",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-350-10",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.4300",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022010614",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/416.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-21-350-10",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-005",
         },
         {
            db: "ZDI",
            id: "ZDI-23-090",
         },
         {
            db: "VULMON",
            id: "CVE-2021-44014",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005656",
         },
         {
            db: "NVD",
            id: "CVE-2021-44014",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1205",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-22-005",
         },
         {
            db: "ZDI",
            id: "ZDI-23-090",
         },
         {
            db: "VULMON",
            id: "CVE-2021-44014",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005656",
         },
         {
            db: "NVD",
            id: "CVE-2021-44014",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1205",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-01-06T00:00:00",
            db: "ZDI",
            id: "ZDI-22-005",
         },
         {
            date: "2023-01-18T00:00:00",
            db: "ZDI",
            id: "ZDI-23-090",
         },
         {
            date: "2021-12-14T00:00:00",
            db: "VULMON",
            id: "CVE-2021-44014",
         },
         {
            date: "2021-12-16T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-005656",
         },
         {
            date: "2021-12-14T12:15:10.770000",
            db: "NVD",
            id: "CVE-2021-44014",
         },
         {
            date: "2021-12-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202112-1205",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-01-09T00:00:00",
            db: "ZDI",
            id: "ZDI-22-005",
         },
         {
            date: "2023-01-18T00:00:00",
            db: "ZDI",
            id: "ZDI-23-090",
         },
         {
            date: "2023-02-21T00:00:00",
            db: "VULMON",
            id: "CVE-2021-44014",
         },
         {
            date: "2023-01-16T07:40:00",
            db: "JVNDB",
            id: "JVNDB-2021-005656",
         },
         {
            date: "2023-02-21T18:35:00.857000",
            db: "NVD",
            id: "CVE-2021-44014",
         },
         {
            date: "2023-01-11T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202112-1205",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202112-1205",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "JT2Go  and  Teamcenter Visualization  Vulnerability in using free memory in",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-005656",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202112-1205",
         },
      ],
      trust: 0.6,
   },
}

var-202107-1422
Vulnerability from variot

A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter Visualization (All versions < V13.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing ASM files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13423). Zero Day Initiative To this vulnerability ZDI-CAN-13423 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of ASM files. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1422",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "jt2go",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.2",
         },
         {
            model: "solid edge",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-865",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009278",
         },
         {
            db: "NVD",
            id: "CVE-2021-34327",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-34327",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Mat Powell of Trend Micro Zero Day Initiative",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-865",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2021-34327",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-34327",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-34327",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-34327",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-34327",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-34327",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202107-924",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-34327",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-865",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34327",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009278",
         },
         {
            db: "NVD",
            id: "CVE-2021-34327",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-924",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter Visualization (All versions < V13.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing ASM files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13423). Zero Day Initiative To this vulnerability  ZDI-CAN-13423 Was numbered.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of ASM files. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-34327",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009278",
         },
         {
            db: "ZDI",
            id: "ZDI-21-865",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34327",
         },
      ],
      trust: 2.88,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-34327",
            trust: 4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-865",
            trust: 3.2,
         },
         {
            db: "SIEMENS",
            id: "SSA-173615",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-483182",
            trust: 1.7,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009278",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-13423",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2403",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021071508",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-194-15",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-924",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-34327",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-865",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34327",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009278",
         },
         {
            db: "NVD",
            id: "CVE-2021-34327",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-924",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   id: "VAR-202107-1422",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.15799868,
   },
   last_update_date: "2023-12-18T11:19:44.083000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-173615 Siemens Security Advisory",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf",
         },
         {
            title: "",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-15https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf",
         },
         {
            title: "Siemens Jt2go  and  Siemens Teamcenter Visualization Security vulnerabilities",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=156617",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=e172da356a059f9e1b4ef7215ce64ef1",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=aa85c53444a3e0726ddb55922c9060c8",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2021-34327 ",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-865",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34327",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009278",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-924",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Incorrect input confirmation (CWE-20) [NVD Evaluation ]",
            trust: 0.8,
         },
         {
            problemtype: " Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-009278",
         },
         {
            db: "NVD",
            id: "CVE-2021-34327",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.2,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-865/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-34327",
         },
         {
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-15https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021071508",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2403",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-15",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/787.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2021-34327",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-865",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34327",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009278",
         },
         {
            db: "NVD",
            id: "CVE-2021-34327",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-924",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-865",
         },
         {
            db: "VULMON",
            id: "CVE-2021-34327",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-009278",
         },
         {
            db: "NVD",
            id: "CVE-2021-34327",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-924",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-07-19T00:00:00",
            db: "ZDI",
            id: "ZDI-21-865",
         },
         {
            date: "2021-07-13T00:00:00",
            db: "VULMON",
            id: "CVE-2021-34327",
         },
         {
            date: "2022-04-19T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-009278",
         },
         {
            date: "2021-07-13T11:15:13.007000",
            db: "NVD",
            id: "CVE-2021-34327",
         },
         {
            date: "2021-07-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202107-924",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-07-19T00:00:00",
            db: "ZDI",
            id: "ZDI-21-865",
         },
         {
            date: "2022-10-07T00:00:00",
            db: "VULMON",
            id: "CVE-2021-34327",
         },
         {
            date: "2022-04-19T09:31:00",
            db: "JVNDB",
            id: "JVNDB-2021-009278",
         },
         {
            date: "2022-10-07T20:47:29.323000",
            db: "NVD",
            id: "CVE-2021-34327",
         },
         {
            date: "2022-10-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202107-924",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202107-924",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Out-of-bounds write vulnerabilities in multiple Siemens products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-009278",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202107-924",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0004
Vulnerability from variot

A vulnerability has been identified in JT2Go (All versions < V13.2.0.7), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V13.1 (All versions < V13.1.0.9), Teamcenter Visualization V13.2 (All versions < V13.2.0.7), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15112). Zero Day Initiative To this vulnerability ZDI-CAN-15112 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Crafted data in a PAR file can trigger a read past the end of an allocated buffer

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0004",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.3.0.1",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "13.1.0",
         },
         {
            model: "jt2go",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0.7",
         },
         {
            model: "teamcenter visualization",
            scope: "gte",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0.7",
         },
         {
            model: "teamcenter visualization",
            scope: "gte",
            trust: 1,
            vendor: "siemens",
            version: "13.3.0",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2022",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.1.0.9",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.2.0.7",
         },
         {
            model: "solid edge",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.3.0.1",
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-340",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005255",
         },
         {
            db: "NVD",
            id: "CVE-2021-44018",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.3.0.1",
                        versionStartIncluding: "13.3.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:13.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2022:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack8:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0.7",
                        versionStartIncluding: "13.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0.7",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-44018",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Mat Powell of Trend Micro Zero Day Initiative",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-340",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-811",
         },
      ],
      trust: 1.3,
   },
   cve: "CVE-2021-44018",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-44018",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-44018",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-44018",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-44018",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-44018",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-811",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-340",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005255",
         },
         {
            db: "NVD",
            id: "CVE-2021-44018",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-811",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in JT2Go (All versions < V13.2.0.7), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V13.1 (All versions < V13.1.0.9), Teamcenter Visualization V13.2 (All versions < V13.2.0.7), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15112). Zero Day Initiative To this vulnerability ZDI-CAN-15112 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Crafted data in a PAR file can trigger a read past the end of an allocated buffer",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-44018",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005255",
         },
         {
            db: "ZDI",
            id: "ZDI-22-340",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-44018",
            trust: 3.9,
         },
         {
            db: "ZDI",
            id: "ZDI-22-340",
            trust: 3.1,
         },
         {
            db: "SIEMENS",
            id: "SSA-301589",
            trust: 1.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-041-07",
            trust: 1.4,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005255",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-15112",
            trust: 0.7,
         },
         {
            db: "CS-HELP",
            id: "SB2022021110",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-811",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-340",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005255",
         },
         {
            db: "NVD",
            id: "CVE-2021-44018",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-811",
         },
      ],
   },
   id: "VAR-202202-0004",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.15799868,
   },
   last_update_date: "2023-12-18T10:54:57.508000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-301589",
            trust: 1.5,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-301589.pdf",
         },
         {
            title: "Siemens Solid Edge Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=182465",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-340",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005255",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-811",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1,
         },
         {
            problemtype: "Buffer error (CWE-119) [NVD evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-005255",
         },
         {
            db: "NVD",
            id: "CVE-2021-44018",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3,
            url: "https://www.zerodayinitiative.com/advisories/zdi-22-340/",
         },
         {
            trust: 2.3,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-301589.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-44018",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/index.html",
         },
         {
            trust: 0.8,
            url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-041-07",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022021110",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-041-07-1",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-041-07-0",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-340",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005255",
         },
         {
            db: "NVD",
            id: "CVE-2021-44018",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-811",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-22-340",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005255",
         },
         {
            db: "NVD",
            id: "CVE-2021-44018",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-811",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-15T00:00:00",
            db: "ZDI",
            id: "ZDI-22-340",
         },
         {
            date: "2023-05-24T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-005255",
         },
         {
            date: "2022-02-09T16:15:14.210000",
            db: "NVD",
            id: "CVE-2021-44018",
         },
         {
            date: "2022-02-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-811",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-15T00:00:00",
            db: "ZDI",
            id: "ZDI-22-340",
         },
         {
            date: "2023-05-24T07:55:00",
            db: "JVNDB",
            id: "JVNDB-2022-005255",
         },
         {
            date: "2022-06-14T10:15:18.273000",
            db: "NVD",
            id: "CVE-2021-44018",
         },
         {
            date: "2022-06-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-811",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-811",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Buffer error vulnerability in multiple Siemens products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-005255",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-811",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0087
Vulnerability from variot

A vulnerability has been identified in JT2Go (All versions < V13.2.0.7), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V13.1 (All versions < V13.1.0.9), Teamcenter Visualization V13.2 (All versions < V13.2.0.7), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15110). Zero Day Initiative To this vulnerability ZDI-CAN-15110 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0087",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.3.0.1",
         },
         {
            model: "jt2go",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0.7",
         },
         {
            model: "teamcenter visualization",
            scope: "gte",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0.7",
         },
         {
            model: "teamcenter visualization",
            scope: "gte",
            trust: 1,
            vendor: "siemens",
            version: "13.3.0",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2022",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.2.0.7",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.3.0.1",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.1.0.9",
         },
         {
            model: "solid edge",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-338",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005319",
         },
         {
            db: "NVD",
            id: "CVE-2021-44016",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.3.0.1",
                        versionStartIncluding: "13.3.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2022:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack8:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0.7",
                        versionStartIncluding: "13.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0.7",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-44016",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Mat Powell of Trend Micro Zero Day Initiative",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-338",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-810",
         },
      ],
      trust: 1.3,
   },
   cve: "CVE-2021-44016",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-44016",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-44016",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-44016",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-44016",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-44016",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-810",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-338",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005319",
         },
         {
            db: "NVD",
            id: "CVE-2021-44016",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-810",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in JT2Go (All versions < V13.2.0.7), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V13.1 (All versions < V13.1.0.9), Teamcenter Visualization V13.2 (All versions < V13.2.0.7), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15110). Zero Day Initiative To this vulnerability ZDI-CAN-15110 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-44016",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005319",
         },
         {
            db: "ZDI",
            id: "ZDI-22-338",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-44016",
            trust: 3.9,
         },
         {
            db: "ZDI",
            id: "ZDI-22-338",
            trust: 3.1,
         },
         {
            db: "SIEMENS",
            id: "SSA-301589",
            trust: 1.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-041-07",
            trust: 1.4,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005319",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-15110",
            trust: 0.7,
         },
         {
            db: "CS-HELP",
            id: "SB2022021110",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-810",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-338",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005319",
         },
         {
            db: "NVD",
            id: "CVE-2021-44016",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-810",
         },
      ],
   },
   id: "VAR-202202-0087",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.15799868,
   },
   last_update_date: "2023-12-18T10:52:28.431000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-301589",
            trust: 1.5,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-301589.pdf",
         },
         {
            title: "Siemens Solid Edge Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=185273",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-338",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005319",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-810",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Buffer error (CWE-119) [NVD evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-005319",
         },
         {
            db: "NVD",
            id: "CVE-2021-44016",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3,
            url: "https://www.zerodayinitiative.com/advisories/zdi-22-338/",
         },
         {
            trust: 2.3,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-301589.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-44016",
         },
         {
            trust: 0.8,
            url: "https://www.cisa.gov/news-events/ics-advisories/icsa-22-041-07",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/index.html",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022021110",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-041-07-1",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-041-07-0",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-338",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005319",
         },
         {
            db: "NVD",
            id: "CVE-2021-44016",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-810",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-22-338",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-005319",
         },
         {
            db: "NVD",
            id: "CVE-2021-44016",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-810",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-15T00:00:00",
            db: "ZDI",
            id: "ZDI-22-338",
         },
         {
            date: "2023-05-26T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-005319",
         },
         {
            date: "2022-02-09T16:15:14.163000",
            db: "NVD",
            id: "CVE-2021-44016",
         },
         {
            date: "2022-02-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-810",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-15T00:00:00",
            db: "ZDI",
            id: "ZDI-22-338",
         },
         {
            date: "2023-05-26T08:24:00",
            db: "JVNDB",
            id: "JVNDB-2022-005319",
         },
         {
            date: "2023-06-26T18:54:58.260000",
            db: "NVD",
            id: "CVE-2021-44016",
         },
         {
            date: "2023-06-27T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-810",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-810",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Buffer error vulnerability in multiple Siemens products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-005319",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-810",
         },
      ],
      trust: 0.6,
   },
}

var-201305-0387
Vulnerability from variot

The Siemens Solid Edge SEListCtrlX ActiveX control \"SetItemReadOnly()\" method has an error that allows an attacker to build a malicious WEB page, convincing the user to parse, and can write certain values to any memory address, causing the application to crash or execute arbitrary code. Siemens Solid Edge is a 3D CAD parametric feature solid modeling software from Siemens (Germany). Provides modeling, assembly design, sketching, simulation, and additional application tools. A memory corruption vulnerability exists in the Siemens Solid Edge SEListCtrlX ActiveX control, which is caused by the program not performing sufficient boundary checks on user-submitted data. An attacker could use this vulnerability to execute arbitrary code in the context of an application (typically IE browser) using ActiveX controls, or it could cause a denial of service. Failed exploit attempts will likely result in denial-of-service conditions

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201305-0387",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "selistctrlx activex control",
            scope: "eq",
            trust: 1.6,
            vendor: "siemens",
            version: "105.x",
         },
         {
            model: "webparthelper activex control",
            scope: "eq",
            trust: 1.2,
            vendor: "siemens",
            version: "105.x",
         },
         {
            model: "solid edge st5",
            scope: "eq",
            trust: 1.2,
            vendor: "siemens",
            version: "105.x",
         },
         {
            model: "webparthelper activex control",
            scope: "eq",
            trust: 0.4,
            vendor: "siemens",
            version: "105.x*",
         },
         {
            model: "solid edge st5",
            scope: "eq",
            trust: 0.4,
            vendor: "siemens",
            version: "105.x*",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "013fbb94-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "IVD",
            id: "02f1f84e-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06292",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06291",
         },
         {
            db: "BID",
            id: "60158",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "rgod",
      sources: [
         {
            db: "BID",
            id: "60158",
         },
         {
            db: "BID",
            id: "60161",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-588",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-586",
         },
      ],
      trust: 1.8,
   },
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  id: "CNVD-2013-06292",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2013-06291",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "IVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  id: "013fbb94-1f22-11e6-abef-000c29c66e3d",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.2,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.9 [IVD]",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "IVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "02f1f84e-1f22-11e6-abef-000c29c66e3d",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.2,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.9 [IVD]",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "CNVD",
                  id: "CNVD-2013-06292",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2013-06291",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "IVD",
                  id: "013fbb94-1f22-11e6-abef-000c29c66e3d",
                  trust: 0.2,
                  value: "HIGH",
               },
               {
                  author: "IVD",
                  id: "02f1f84e-1f22-11e6-abef-000c29c66e3d",
                  trust: 0.2,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "013fbb94-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "IVD",
            id: "02f1f84e-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06292",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06291",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The Siemens Solid Edge SEListCtrlX ActiveX control \\\"SetItemReadOnly()\\\" method has an error that allows an attacker to build a malicious WEB page, convincing the user to parse, and can write certain values to any memory address, causing the application to crash or execute arbitrary code. Siemens Solid Edge is a 3D CAD parametric feature solid modeling software from Siemens (Germany). Provides modeling, assembly design, sketching, simulation, and additional application tools. \nA memory corruption vulnerability exists in the Siemens Solid Edge SEListCtrlX ActiveX control, which is caused by the program not performing sufficient boundary checks on user-submitted data. An attacker could use this vulnerability to execute arbitrary code in the context of an application (typically IE browser) using ActiveX controls, or it could cause a denial of service. Failed exploit attempts will likely result in denial-of-service conditions",
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-06292",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06291",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-588",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-586",
         },
         {
            db: "BID",
            id: "60158",
         },
         {
            db: "BID",
            id: "60161",
         },
         {
            db: "IVD",
            id: "013fbb94-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "IVD",
            id: "02f1f84e-1f22-11e6-abef-000c29c66e3d",
         },
      ],
      trust: 3.06,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "60158",
            trust: 1.5,
         },
         {
            db: "BID",
            id: "60161",
            trust: 1.5,
         },
         {
            db: "SECUNIA",
            id: "53595",
            trust: 1.2,
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06292",
            trust: 0.8,
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06291",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-588",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-586",
            trust: 0.6,
         },
         {
            db: "IVD",
            id: "013FBB94-1F22-11E6-ABEF-000C29C66E3D",
            trust: 0.2,
         },
         {
            db: "IVD",
            id: "02F1F84E-1F22-11E6-ABEF-000C29C66E3D",
            trust: 0.2,
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "013fbb94-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "IVD",
            id: "02f1f84e-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06292",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06291",
         },
         {
            db: "BID",
            id: "60158",
         },
         {
            db: "BID",
            id: "60161",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-588",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-586",
         },
      ],
   },
   id: "VAR-201305-0387",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "IVD",
            id: "013fbb94-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "IVD",
            id: "02f1f84e-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06292",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06291",
         },
      ],
      trust: 2.3978205125,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "ICS",
            ],
            sub_category: null,
            trust: 1.6,
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "013fbb94-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "IVD",
            id: "02f1f84e-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06292",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06291",
         },
      ],
   },
   last_update_date: "2022-05-17T01:48:04.993000Z",
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.2,
            url: "http://www.secunia.com/advisories/53595/",
         },
         {
            trust: 0.6,
            url: "http://retrogod.altervista.org/9sg_siemens_adv_i.htm",
         },
         {
            trust: 0.6,
            url: "http://retrogod.altervista.org/9sg_siemens_adv_ii.htm",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/bid/60158",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/bid/60161",
         },
         {
            trust: 0.3,
            url: "http://www.siemens.com/",
         },
         {
            trust: 0.3,
            url: "http://www.plm.automation.siemens.com/en_us/products/velocity/solidedge/",
         },
         {
            trust: 0.3,
            url: "http://subscriber.communications.siemens.com/",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2013-06292",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06291",
         },
         {
            db: "BID",
            id: "60158",
         },
         {
            db: "BID",
            id: "60161",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-588",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-586",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "IVD",
            id: "013fbb94-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "IVD",
            id: "02f1f84e-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06292",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06291",
         },
         {
            db: "BID",
            id: "60158",
         },
         {
            db: "BID",
            id: "60161",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-588",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-586",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-05-29T00:00:00",
            db: "IVD",
            id: "013fbb94-1f22-11e6-abef-000c29c66e3d",
         },
         {
            date: "2013-05-29T00:00:00",
            db: "IVD",
            id: "02f1f84e-1f22-11e6-abef-000c29c66e3d",
         },
         {
            date: "2013-05-29T00:00:00",
            db: "CNVD",
            id: "CNVD-2013-06292",
         },
         {
            date: "2013-05-29T00:00:00",
            db: "CNVD",
            id: "CNVD-2013-06291",
         },
         {
            date: "2013-05-26T00:00:00",
            db: "BID",
            id: "60158",
         },
         {
            date: "2013-05-26T00:00:00",
            db: "BID",
            id: "60161",
         },
         {
            date: "2013-05-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201305-588",
         },
         {
            date: "2013-05-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201305-586",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-06-03T00:00:00",
            db: "CNVD",
            id: "CNVD-2013-06292",
         },
         {
            date: "2013-06-03T00:00:00",
            db: "CNVD",
            id: "CNVD-2013-06291",
         },
         {
            date: "2013-05-26T00:00:00",
            db: "BID",
            id: "60158",
         },
         {
            date: "2013-10-04T00:14:00",
            db: "BID",
            id: "60161",
         },
         {
            date: "2013-05-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201305-588",
         },
         {
            date: "2013-05-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201305-586",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201305-588",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-586",
         },
      ],
      trust: 1.2,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens Solid Edge WebPartHelper ActiveX Remote code execution vulnerability",
      sources: [
         {
            db: "IVD",
            id: "013fbb94-1f22-11e6-abef-000c29c66e3d",
         },
         {
            db: "CNVD",
            id: "CNVD-2013-06292",
         },
         {
            db: "BID",
            id: "60158",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201305-588",
         },
      ],
      trust: 1.7,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "60158",
         },
         {
            db: "BID",
            id: "60161",
         },
      ],
      trust: 0.6,
   },
}

var-202101-0350
Vulnerability from variot

A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892). Several Siemens products are vulnerable to out-of-bounds writes. Zero Day Initiative To this vulnerability ZDI-CAN-11892 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,

VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0350",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.1.0.1",
         },
         {
            model: "jt2go",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.1.0.1",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.1.0.1",
         },
         {
            model: "solid edge",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
         {
            model: "jt2go",
            scope: "eq",
            trust: 0.6,
            vendor: "siemens",
            version: "v13.1.0",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.6,
            vendor: "siemens",
            version: "v13.1.0",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-050",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02582",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015271",
         },
         {
            db: "NVD",
            id: "CVE-2020-26989",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.1.0.1",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.1.0.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-26989",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "rgod",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-050",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2020-26989",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2020-26989",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "CNVD-2021-02582",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-26989",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-26989",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-26989",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2020-26989",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2021-02582",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202101-848",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-050",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02582",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015271",
         },
         {
            db: "NVD",
            id: "CVE-2020-26989",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-848",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892). Several Siemens products are vulnerable to out-of-bounds writes. Zero Day Initiative To this vulnerability ZDI-CAN-11892 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,\r\n\r\nVFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-26989",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015271",
         },
         {
            db: "ZDI",
            id: "ZDI-21-050",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02582",
         },
      ],
      trust: 2.79,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-26989",
            trust: 3.7,
         },
         {
            db: "ZDI",
            id: "ZDI-21-050",
            trust: 3.1,
         },
         {
            db: "SIEMENS",
            id: "SSA-622830",
            trust: 2.2,
         },
         {
            db: "SIEMENS",
            id: "SSA-663999",
            trust: 1.6,
         },
         {
            db: "SIEMENS",
            id: "SSA-979834",
            trust: 1.6,
         },
         {
            db: "JVN",
            id: "JVNVU91685542",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015271",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-11892",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02582",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0125",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0495",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-012-03",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-040-06",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-848",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-050",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02582",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015271",
         },
         {
            db: "NVD",
            id: "CVE-2020-26989",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-848",
         },
      ],
   },
   id: "VAR-202101-0350",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-02582",
         },
      ],
      trust: 0.75799868,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "IoT",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-02582",
         },
      ],
   },
   last_update_date: "2023-12-18T11:16:21.866000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-979834",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf",
         },
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/",
         },
         {
            title: "Patch for JT2Go and Teamcenter Visualization heap buffer overflow vulnerability (CNVD-2021-02582)",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/243982",
         },
         {
            title: "Siemens Jt2go  and  Teamcenter Visualization Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139359",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-050",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02582",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015271",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-848",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-121",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015271",
         },
         {
            db: "NVD",
            id: "CVE-2020-26989",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-050/",
         },
         {
            trust: 2.2,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-26989",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu91685542/",
         },
         {
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0495",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0125/",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-050",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02582",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015271",
         },
         {
            db: "NVD",
            id: "CVE-2020-26989",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-848",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-050",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02582",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015271",
         },
         {
            db: "NVD",
            id: "CVE-2020-26989",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-848",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-01-14T00:00:00",
            db: "ZDI",
            id: "ZDI-21-050",
         },
         {
            date: "2021-01-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-02582",
         },
         {
            date: "2021-09-15T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-015271",
         },
         {
            date: "2021-01-12T21:15:17.183000",
            db: "NVD",
            id: "CVE-2020-26989",
         },
         {
            date: "2021-01-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202101-848",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-01-14T00:00:00",
            db: "ZDI",
            id: "ZDI-21-050",
         },
         {
            date: "2021-01-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-02582",
         },
         {
            date: "2021-09-15T08:33:00",
            db: "JVNDB",
            id: "JVNDB-2020-015271",
         },
         {
            date: "2021-07-23T19:51:52.917000",
            db: "NVD",
            id: "CVE-2020-26989",
         },
         {
            date: "2021-07-16T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202101-848",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202101-848",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Out-of-bounds write vulnerabilities in multiple Siemens products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015271",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202101-848",
         },
      ],
      trust: 0.6,
   },
}

var-202101-1950
Vulnerability from variot

A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process. Solid Edge Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Solid Edge is a combination of software tools to solve various product development processes

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1950",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2021mp2",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2020mp12",
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
         {
            model: "solid edge <se2021mp2",
            scope: null,
            trust: 0.6,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-074",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02634",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015352",
         },
         {
            db: "NVD",
            id: "CVE-2020-28381",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2020",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack10:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack11:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack8:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack9:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28381",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "rgod",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-074",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2020-28381",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2020-28381",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "CNVD-2021-02634",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-28381",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-28381",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-28381",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2020-28381",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2021-02634",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202101-841",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-074",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02634",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015352",
         },
         {
            db: "NVD",
            id: "CVE-2020-28381",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-841",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process. Solid Edge Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. Solid Edge is a combination of software tools to solve various product development processes",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28381",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015352",
         },
         {
            db: "ZDI",
            id: "ZDI-21-074",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02634",
         },
      ],
      trust: 2.79,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-28381",
            trust: 3.7,
         },
         {
            db: "ZDI",
            id: "ZDI-21-074",
            trust: 3.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-012-04",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-979834",
            trust: 2.2,
         },
         {
            db: "ZDI",
            id: "ZDI-21-053",
            trust: 1.6,
         },
         {
            db: "ZDI",
            id: "ZDI-21-048",
            trust: 1.6,
         },
         {
            db: "JVN",
            id: "JVNVU91685542",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015352",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-11918",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02634",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0126",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-841",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-074",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02634",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015352",
         },
         {
            db: "NVD",
            id: "CVE-2020-28381",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-841",
         },
      ],
   },
   id: "VAR-202101-1950",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-02634",
         },
      ],
      trust: 0.06,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "IoT",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-02634",
         },
      ],
   },
   last_update_date: "2023-12-18T11:30:31.312000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-979834",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
         },
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-04",
         },
         {
            title: "Patch for Solid Edge has unspecified vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/244045",
         },
         {
            title: "Siemens Solid Edge Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139354",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-074",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02634",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015352",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-841",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015352",
         },
         {
            db: "NVD",
            id: "CVE-2020-28381",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-04",
         },
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-074/",
         },
         {
            trust: 2.2,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
         },
         {
            trust: 1.6,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-048/",
         },
         {
            trust: 1.6,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-053/",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-28381",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu91685542/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0126/",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-074",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02634",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015352",
         },
         {
            db: "NVD",
            id: "CVE-2020-28381",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-841",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-074",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02634",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015352",
         },
         {
            db: "NVD",
            id: "CVE-2020-28381",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-841",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-01-20T00:00:00",
            db: "ZDI",
            id: "ZDI-21-074",
         },
         {
            date: "2021-01-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-02634",
         },
         {
            date: "2021-09-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-015352",
         },
         {
            date: "2021-01-12T21:15:17.683000",
            db: "NVD",
            id: "CVE-2020-28381",
         },
         {
            date: "2021-01-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202101-841",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-01-20T00:00:00",
            db: "ZDI",
            id: "ZDI-21-074",
         },
         {
            date: "2021-01-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-02634",
         },
         {
            date: "2021-09-17T05:28:00",
            db: "JVNDB",
            id: "JVNDB-2020-015352",
         },
         {
            date: "2021-12-10T21:47:07.840000",
            db: "NVD",
            id: "CVE-2020-28381",
         },
         {
            date: "2021-02-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202101-841",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202101-841",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Solid Edge  Out-of-bounds Vulnerability in Microsoft",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015352",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202101-841",
         },
      ],
      trust: 0.6,
   },
}

var-202109-1119
Vulnerability from variot

A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13778). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of OBJ files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1119",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1120",
         },
         {
            db: "NVD",
            id: "CVE-2021-41536",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41536",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "xina1i",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1120",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1833",
         },
      ],
      trust: 1.3,
   },
   cve: "CVE-2021-41536",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2021-41536",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.1,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41536",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41536",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-41536",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-41536",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202109-1833",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-41536",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1120",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41536",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1833",
         },
         {
            db: "NVD",
            id: "CVE-2021-41536",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13778). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of OBJ files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41536",
         },
         {
            db: "ZDI",
            id: "ZDI-21-1120",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41536",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-41536",
            trust: 2.4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-1120",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-728618",
            trust: 1.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-13778",
            trust: 0.7,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-287-06",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021092905",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3454",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1833",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-41536",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1120",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41536",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1833",
         },
         {
            db: "NVD",
            id: "CVE-2021-41536",
         },
      ],
   },
   id: "VAR-202109-1119",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-04T07:11:04.202000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "",
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            title: "Siemens Solid Edge Remediation of resource management error vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=164363",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=3b85ee03e935aff52e55e7402b3926a1",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1120",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41536",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1833",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-416",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41536",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-1120/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-287-06",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3454",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021092905",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-41536",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/416.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1120",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41536",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1833",
         },
         {
            db: "NVD",
            id: "CVE-2021-41536",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-1120",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41536",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1833",
         },
         {
            db: "NVD",
            id: "CVE-2021-41536",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1120",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41536",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1833",
         },
         {
            date: "2021-09-28T12:15:00",
            db: "NVD",
            id: "CVE-2021-41536",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1120",
         },
         {
            date: "2021-10-01T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41536",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-10-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1833",
         },
         {
            date: "2021-10-01T13:52:00",
            db: "NVD",
            id: "CVE-2021-41536",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-1833",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens Solid Edge Viewer OBJ File Parsing Use-After-Free Remote Code Execution Vulnerability",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1120",
         },
      ],
      trust: 0.7,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202111-0809
Vulnerability from variot

An Out-of-Bounds Write vulnerability exists when reading a DXF or DWG file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DXF and DWG files. Crafted data in a DXF or DWG file (an invalid number of properties) can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0809",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "drawing sdk",
            scope: null,
            trust: 2.8,
            vendor: "open design alliance oda",
            version: null,
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 1.4,
            vendor: "siemens",
            version: null,
         },
         {
            model: "drawings software development kit",
            scope: "lt",
            trust: 1,
            vendor: "opendesign",
            version: "2022.11",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.3.0.1",
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "13.1.0",
         },
         {
            model: "teamcenter visualization",
            scope: "gte",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0",
         },
         {
            model: "jt2go",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "12.4.0.13",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2022",
         },
         {
            model: "teamcenter visualization",
            scope: "gte",
            trust: 1,
            vendor: "siemens",
            version: "12.4.0",
         },
         {
            model: "drawings sdk",
            scope: "eq",
            trust: 0.8,
            vendor: "open design alliance",
            version: "2022.11",
         },
         {
            model: "drawings sdk",
            scope: "eq",
            trust: 0.8,
            vendor: "open design alliance",
            version: null,
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-334",
         },
         {
            db: "ZDI",
            id: "ZDI-23-127",
         },
         {
            db: "ZDI",
            id: "ZDI-23-126",
         },
         {
            db: "ZDI",
            id: "ZDI-23-125",
         },
         {
            db: "ZDI",
            id: "ZDI-23-210",
         },
         {
            db: "ZDI",
            id: "ZDI-23-209",
         },
         {
            db: "ZDI",
            id: "ZDI-23-212",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007492",
         },
         {
            db: "NVD",
            id: "CVE-2021-43336",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:opendesign:drawings_software_development_kit:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "2022.11",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:13.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2022:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.3.0.1",
                        versionStartIncluding: "13.2.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "12.4.0.13",
                        versionStartIncluding: "12.4.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-43336",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Mat Powell & Jimmy Calderon (@vectors2final) of Trend Micro Zero Day Initiative",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-23-127",
         },
         {
            db: "ZDI",
            id: "ZDI-23-126",
         },
         {
            db: "ZDI",
            id: "ZDI-23-125",
         },
         {
            db: "ZDI",
            id: "ZDI-23-212",
         },
      ],
      trust: 2.8,
   },
   cve: "CVE-2021-43336",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-43336",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-43336",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 4.9,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-43336",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "ZDI",
                  id: "CVE-2021-43336",
                  trust: 4.9,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2021-43336",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202111-1217",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-43336",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-334",
         },
         {
            db: "ZDI",
            id: "ZDI-23-127",
         },
         {
            db: "ZDI",
            id: "ZDI-23-126",
         },
         {
            db: "ZDI",
            id: "ZDI-23-125",
         },
         {
            db: "ZDI",
            id: "ZDI-23-210",
         },
         {
            db: "ZDI",
            id: "ZDI-23-209",
         },
         {
            db: "ZDI",
            id: "ZDI-23-212",
         },
         {
            db: "VULMON",
            id: "CVE-2021-43336",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007492",
         },
         {
            db: "NVD",
            id: "CVE-2021-43336",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202111-1217",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An Out-of-Bounds Write vulnerability exists when reading a DXF or DWG file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DXF and DWG files. Crafted data in a DXF or DWG file (an invalid number of properties) can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-43336",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007492",
         },
         {
            db: "ZDI",
            id: "ZDI-22-334",
         },
         {
            db: "ZDI",
            id: "ZDI-23-127",
         },
         {
            db: "ZDI",
            id: "ZDI-23-126",
         },
         {
            db: "ZDI",
            id: "ZDI-23-125",
         },
         {
            db: "ZDI",
            id: "ZDI-23-210",
         },
         {
            db: "ZDI",
            id: "ZDI-23-209",
         },
         {
            db: "ZDI",
            id: "ZDI-23-212",
         },
         {
            db: "VULMON",
            id: "CVE-2021-43336",
         },
      ],
      trust: 6.12,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-43336",
            trust: 8.2,
         },
         {
            db: "ZDI",
            id: "ZDI-22-334",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-301589",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-491245",
            trust: 1.7,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-041-07",
            trust: 1.5,
         },
         {
            db: "ICS CERT",
            id: "ICSA-23-047-01",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97514209",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007492",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-15107",
            trust: 0.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-19144",
            trust: 0.7,
         },
         {
            db: "ZDI",
            id: "ZDI-23-127",
            trust: 0.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-19143",
            trust: 0.7,
         },
         {
            db: "ZDI",
            id: "ZDI-23-126",
            trust: 0.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-19142",
            trust: 0.7,
         },
         {
            db: "ZDI",
            id: "ZDI-23-125",
            trust: 0.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-19080",
            trust: 0.7,
         },
         {
            db: "ZDI",
            id: "ZDI-23-210",
            trust: 0.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-19075",
            trust: 0.7,
         },
         {
            db: "ZDI",
            id: "ZDI-23-209",
            trust: 0.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-19165",
            trust: 0.7,
         },
         {
            db: "ZDI",
            id: "ZDI-23-212",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2023.0960",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2022021108",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202111-1217",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-43336",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-334",
         },
         {
            db: "ZDI",
            id: "ZDI-23-127",
         },
         {
            db: "ZDI",
            id: "ZDI-23-126",
         },
         {
            db: "ZDI",
            id: "ZDI-23-125",
         },
         {
            db: "ZDI",
            id: "ZDI-23-210",
         },
         {
            db: "ZDI",
            id: "ZDI-23-209",
         },
         {
            db: "ZDI",
            id: "ZDI-23-212",
         },
         {
            db: "VULMON",
            id: "CVE-2021-43336",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007492",
         },
         {
            db: "NVD",
            id: "CVE-2021-43336",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202111-1217",
         },
      ],
   },
   id: "VAR-202111-0809",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.15799868,
   },
   last_update_date: "2023-12-18T10:50:00.081000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Vulnerabilities in the ODA Drawings Software Development Kit",
            trust: 3.6,
            url: "https://www.opendesign.com/security-advisories",
         },
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 1.4,
            url: "https://cert-portal.siemens.com/productcert/html/ssa-491245.html",
         },
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 0.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-301589.pdf",
         },
         {
            title: "Open Design Alliance Drawings SDK Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=170359",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=fefc850707fc7ccce29d30c42162ee31",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2021-43336 ",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-334",
         },
         {
            db: "ZDI",
            id: "ZDI-23-127",
         },
         {
            db: "ZDI",
            id: "ZDI-23-126",
         },
         {
            db: "ZDI",
            id: "ZDI-23-125",
         },
         {
            db: "ZDI",
            id: "ZDI-23-210",
         },
         {
            db: "ZDI",
            id: "ZDI-23-209",
         },
         {
            db: "ZDI",
            id: "ZDI-23-212",
         },
         {
            db: "VULMON",
            id: "CVE-2021-43336",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007492",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202111-1217",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007492",
         },
         {
            db: "NVD",
            id: "CVE-2021-43336",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 4.5,
            url: "https://www.opendesign.com/security-advisories",
         },
         {
            trust: 2.4,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-301589.pdf",
         },
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-22-334/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf",
         },
         {
            trust: 1.4,
            url: "https://cert-portal.siemens.com/productcert/html/ssa-491245.html",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-43336",
         },
         {
            trust: 0.9,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-041-07",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu97514209/index.html",
         },
         {
            trust: 0.8,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-23-047-01",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022021108",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2023.0960",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-041-07-1",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-041-07-0",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/787.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2021-43336",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-334",
         },
         {
            db: "ZDI",
            id: "ZDI-23-127",
         },
         {
            db: "ZDI",
            id: "ZDI-23-126",
         },
         {
            db: "ZDI",
            id: "ZDI-23-125",
         },
         {
            db: "ZDI",
            id: "ZDI-23-210",
         },
         {
            db: "ZDI",
            id: "ZDI-23-209",
         },
         {
            db: "ZDI",
            id: "ZDI-23-212",
         },
         {
            db: "VULMON",
            id: "CVE-2021-43336",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007492",
         },
         {
            db: "NVD",
            id: "CVE-2021-43336",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202111-1217",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-22-334",
         },
         {
            db: "ZDI",
            id: "ZDI-23-127",
         },
         {
            db: "ZDI",
            id: "ZDI-23-126",
         },
         {
            db: "ZDI",
            id: "ZDI-23-125",
         },
         {
            db: "ZDI",
            id: "ZDI-23-210",
         },
         {
            db: "ZDI",
            id: "ZDI-23-209",
         },
         {
            db: "ZDI",
            id: "ZDI-23-212",
         },
         {
            db: "VULMON",
            id: "CVE-2021-43336",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007492",
         },
         {
            db: "NVD",
            id: "CVE-2021-43336",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202111-1217",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-15T00:00:00",
            db: "ZDI",
            id: "ZDI-22-334",
         },
         {
            date: "2023-02-09T00:00:00",
            db: "ZDI",
            id: "ZDI-23-127",
         },
         {
            date: "2023-02-09T00:00:00",
            db: "ZDI",
            id: "ZDI-23-126",
         },
         {
            date: "2023-02-09T00:00:00",
            db: "ZDI",
            id: "ZDI-23-125",
         },
         {
            date: "2023-03-01T00:00:00",
            db: "ZDI",
            id: "ZDI-23-210",
         },
         {
            date: "2023-03-01T00:00:00",
            db: "ZDI",
            id: "ZDI-23-209",
         },
         {
            date: "2023-02-09T00:00:00",
            db: "ZDI",
            id: "ZDI-23-212",
         },
         {
            date: "2021-11-14T00:00:00",
            db: "VULMON",
            id: "CVE-2021-43336",
         },
         {
            date: "2022-02-15T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-007492",
         },
         {
            date: "2021-11-14T21:15:08.263000",
            db: "NVD",
            id: "CVE-2021-43336",
         },
         {
            date: "2021-11-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202111-1217",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-15T00:00:00",
            db: "ZDI",
            id: "ZDI-22-334",
         },
         {
            date: "2023-02-09T00:00:00",
            db: "ZDI",
            id: "ZDI-23-127",
         },
         {
            date: "2023-02-09T00:00:00",
            db: "ZDI",
            id: "ZDI-23-126",
         },
         {
            date: "2023-02-09T00:00:00",
            db: "ZDI",
            id: "ZDI-23-125",
         },
         {
            date: "2023-03-01T00:00:00",
            db: "ZDI",
            id: "ZDI-23-210",
         },
         {
            date: "2023-03-01T00:00:00",
            db: "ZDI",
            id: "ZDI-23-209",
         },
         {
            date: "2023-03-06T00:00:00",
            db: "ZDI",
            id: "ZDI-23-212",
         },
         {
            date: "2023-02-24T00:00:00",
            db: "VULMON",
            id: "CVE-2021-43336",
         },
         {
            date: "2023-02-17T02:09:00",
            db: "JVNDB",
            id: "JVNDB-2021-007492",
         },
         {
            date: "2023-02-24T15:53:38.813000",
            db: "NVD",
            id: "CVE-2021-43336",
         },
         {
            date: "2023-02-17T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202111-1217",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202111-1217",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Open Design Alliance (ODA) Drawing SDK DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-23-127",
         },
         {
            db: "ZDI",
            id: "ZDI-23-126",
         },
      ],
      trust: 1.4,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202111-1217",
         },
      ],
      trust: 0.6,
   },
}

var-202112-0807
Vulnerability from variot

A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15058, ZDI-CAN-19076, ZDI-CAN-19077). JT2Go and Teamcenter Visualization Exists in an out-of-bounds write vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-15058 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JT files

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0807",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge viewer",
            scope: null,
            trust: 1.4,
            vendor: "siemens",
            version: null,
         },
         {
            model: "jt utilities",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.1.1.0",
         },
         {
            model: "jt open toolkit",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "11.1.1.0",
         },
         {
            model: "jt2go",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0.5",
         },
         {
            model: "teamcenter visualization",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "13.2.0.5",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2023",
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "teamcenter visualization",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "13.2.0.5",
         },
         {
            model: "jt2go",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-006",
         },
         {
            db: "ZDI",
            id: "ZDI-23-088",
         },
         {
            db: "ZDI",
            id: "ZDI-23-087",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005666",
         },
         {
            db: "NVD",
            id: "CVE-2021-44002",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt_open_toolkit:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.1.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt_utilities:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.1.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0.5",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.2.0.5",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2023",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-44002",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Mat Powell of Trend Micro Zero Day Initiative",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-006",
         },
         {
            db: "ZDI",
            id: "ZDI-23-088",
         },
         {
            db: "ZDI",
            id: "ZDI-23-087",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1193",
         },
      ],
      trust: 2.7,
   },
   cve: "CVE-2021-44002",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-44002",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-44002",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 2.1,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 2,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-44002",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "ZDI",
                  id: "CVE-2021-44002",
                  trust: 2.1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2021-44002",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "productcert@siemens.com",
                  id: "CVE-2021-44002",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202112-1193",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-44002",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-006",
         },
         {
            db: "ZDI",
            id: "ZDI-23-088",
         },
         {
            db: "ZDI",
            id: "ZDI-23-087",
         },
         {
            db: "VULMON",
            id: "CVE-2021-44002",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005666",
         },
         {
            db: "NVD",
            id: "CVE-2021-44002",
         },
         {
            db: "NVD",
            id: "CVE-2021-44002",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1193",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15058, ZDI-CAN-19076, ZDI-CAN-19077). JT2Go and Teamcenter Visualization Exists in an out-of-bounds write vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-15058 Was numbering.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JT files",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-44002",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005666",
         },
         {
            db: "ZDI",
            id: "ZDI-22-006",
         },
         {
            db: "ZDI",
            id: "ZDI-23-088",
         },
         {
            db: "ZDI",
            id: "ZDI-23-087",
         },
         {
            db: "VULMON",
            id: "CVE-2021-44002",
         },
      ],
      trust: 3.6,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-44002",
            trust: 5.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-936212",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-595101",
            trust: 1.7,
         },
         {
            db: "ZDI",
            id: "ZDI-22-006",
            trust: 1.4,
         },
         {
            db: "JVN",
            id: "JVNVU96592426",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU90782730",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005666",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-15058",
            trust: 0.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-19077",
            trust: 0.7,
         },
         {
            db: "ZDI",
            id: "ZDI-23-088",
            trust: 0.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-19076",
            trust: 0.7,
         },
         {
            db: "ZDI",
            id: "ZDI-23-087",
            trust: 0.7,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-350-10",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.4300",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2022010614",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1193",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-44002",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-006",
         },
         {
            db: "ZDI",
            id: "ZDI-23-088",
         },
         {
            db: "ZDI",
            id: "ZDI-23-087",
         },
         {
            db: "VULMON",
            id: "CVE-2021-44002",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005666",
         },
         {
            db: "NVD",
            id: "CVE-2021-44002",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1193",
         },
      ],
   },
   id: "VAR-202112-0807",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.15799868,
   },
   last_update_date: "2023-12-18T10:56:33.053000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 1.4,
            url: "https://cert-portal.siemens.com/productcert/html/ssa-936212.html",
         },
         {
            title: "SSA-595101",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf",
         },
         {
            title: "",
            trust: 0.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdfhttps://www.cisa.gov/uscert/ics/advisories/icsa-21-350-10",
         },
         {
            title: "Siemens Jt2go  and Siemens Teamcenter Visualization Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=175052",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=39139dcd04f2a523ea449623583b65af",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-006",
         },
         {
            db: "ZDI",
            id: "ZDI-23-088",
         },
         {
            db: "ZDI",
            id: "ZDI-23-087",
         },
         {
            db: "VULMON",
            id: "CVE-2021-44002",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005666",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1193",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [ others ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-005666",
         },
         {
            db: "NVD",
            id: "CVE-2021-44002",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-936212.pdf",
         },
         {
            trust: 1.4,
            url: "https://cert-portal.siemens.com/productcert/html/ssa-936212.html",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-44002",
         },
         {
            trust: 1.3,
            url: "https://www.zerodayinitiative.com/advisories/zdi-22-006/",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu96592426/",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu90782730/",
         },
         {
            trust: 0.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdfhttps://www.cisa.gov/uscert/ics/advisories/icsa-21-350-10",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-350-10",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.4300",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022010614",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/787.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-21-350-10",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-22-006",
         },
         {
            db: "ZDI",
            id: "ZDI-23-088",
         },
         {
            db: "ZDI",
            id: "ZDI-23-087",
         },
         {
            db: "VULMON",
            id: "CVE-2021-44002",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005666",
         },
         {
            db: "NVD",
            id: "CVE-2021-44002",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1193",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-22-006",
         },
         {
            db: "ZDI",
            id: "ZDI-23-088",
         },
         {
            db: "ZDI",
            id: "ZDI-23-087",
         },
         {
            db: "VULMON",
            id: "CVE-2021-44002",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-005666",
         },
         {
            db: "NVD",
            id: "CVE-2021-44002",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202112-1193",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-01-06T00:00:00",
            db: "ZDI",
            id: "ZDI-22-006",
         },
         {
            date: "2023-01-18T00:00:00",
            db: "ZDI",
            id: "ZDI-23-088",
         },
         {
            date: "2023-01-18T00:00:00",
            db: "ZDI",
            id: "ZDI-23-087",
         },
         {
            date: "2021-12-14T00:00:00",
            db: "VULMON",
            id: "CVE-2021-44002",
         },
         {
            date: "2021-12-16T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-005666",
         },
         {
            date: "2021-12-14T12:15:10.143000",
            db: "NVD",
            id: "CVE-2021-44002",
         },
         {
            date: "2021-12-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202112-1193",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-01-09T00:00:00",
            db: "ZDI",
            id: "ZDI-22-006",
         },
         {
            date: "2023-01-18T00:00:00",
            db: "ZDI",
            id: "ZDI-23-088",
         },
         {
            date: "2023-01-18T00:00:00",
            db: "ZDI",
            id: "ZDI-23-087",
         },
         {
            date: "2023-02-21T00:00:00",
            db: "VULMON",
            id: "CVE-2021-44002",
         },
         {
            date: "2023-01-16T07:40:00",
            db: "JVNDB",
            id: "JVNDB-2021-005666",
         },
         {
            date: "2023-02-21T18:34:56.270000",
            db: "NVD",
            id: "CVE-2021-44002",
         },
         {
            date: "2023-01-11T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202112-1193",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202112-1193",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens Solid Edge Viewer JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-23-088",
         },
         {
            db: "ZDI",
            id: "ZDI-23-087",
         },
      ],
      trust: 1.4,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202112-1193",
         },
      ],
      trust: 0.6,
   },
}

var-202109-1791
Vulnerability from variot

A vulnerability has been identified in NX 1953 Series (All versions < V1973.3700), NX 1980 Series (All versions < V1988), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770). This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of OBJ files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1791",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "nx 1969",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1973.3700",
         },
         {
            model: "nx 1984",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1984",
         },
         {
            model: "nx 1961",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1973.3700",
         },
         {
            model: "nx 1965",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1973.3700",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "nx 1988",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1984",
         },
         {
            model: "nx 1957",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1973.3700",
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1122",
         },
         {
            db: "NVD",
            id: "CVE-2021-41538",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1984_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1984",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1984:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1984_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1984",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1984:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1988_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1984",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1988:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1988_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1984",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1988:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1957_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1973.3700",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1957:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1957_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1973.3700",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1957:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1961_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1973.3700",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1961:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1961_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1973.3700",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1961:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1965_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1973.3700",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1965:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1965_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1973.3700",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1965:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:nx_1969_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1973.3700",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:nx_1969:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:nx_1969_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1973.3700",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:nx_1969:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41538",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "xina1i",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1122",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1835",
         },
      ],
      trust: 1.3,
   },
   cve: "CVE-2021-41538",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2021-41538",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.1,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41538",
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41538",
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-41538",
                  trust: 1,
                  value: "LOW",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-41538",
                  trust: 0.7,
                  value: "LOW",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202109-1835",
                  trust: 0.6,
                  value: "LOW",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-41538",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1122",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41538",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1835",
         },
         {
            db: "NVD",
            id: "CVE-2021-41538",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in NX 1953 Series (All versions < V1973.3700), NX 1980 Series (All versions < V1988), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770). This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of OBJ files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41538",
         },
         {
            db: "ZDI",
            id: "ZDI-21-1122",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41538",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-41538",
            trust: 2.4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-1122",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-728618",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-328042",
            trust: 1.6,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-13770",
            trust: 0.7,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021092905",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021111007",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3454",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3874",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-315-08",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-287-06",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1835",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-41538",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1122",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41538",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1835",
         },
         {
            db: "NVD",
            id: "CVE-2021-41538",
         },
      ],
   },
   id: "VAR-202109-1791",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-05T07:03:08.343000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "",
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            title: "Siemens Solid Edge Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=165208",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=3b85ee03e935aff52e55e7402b3926a1",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1122",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41538",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1835",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-824",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41538",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-1122/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf",
         },
         {
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-287-06",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3874",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3454",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-41538",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021092905",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-315-08",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021111007",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/824.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1122",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41538",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1835",
         },
         {
            db: "NVD",
            id: "CVE-2021-41538",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-1122",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41538",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1835",
         },
         {
            db: "NVD",
            id: "CVE-2021-41538",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1122",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41538",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1835",
         },
         {
            date: "2021-09-28T12:15:00",
            db: "NVD",
            id: "CVE-2021-41538",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1122",
         },
         {
            date: "2021-10-01T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41538",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-11-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1835",
         },
         {
            date: "2021-11-28T23:29:00",
            db: "NVD",
            id: "CVE-2021-41538",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-1835",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens Solid Edge Viewer OBJ File Parsing Uninitialized Pointer Information Disclosure Vulnerability",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1122",
         },
      ],
      trust: 0.7,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202109-1122
Vulnerability from variot

A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13776). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of OBJ files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1122",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1124",
         },
         {
            db: "NVD",
            id: "CVE-2021-41540",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2021",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41540",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "xina1i",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1124",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1836",
         },
      ],
      trust: 1.3,
   },
   cve: "CVE-2021-41540",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2021-41540",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.1,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41540",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2021-41540",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-41540",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2021-41540",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202109-1836",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2021-41540",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1124",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41540",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1836",
         },
         {
            db: "NVD",
            id: "CVE-2021-41540",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13776). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of OBJ files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41540",
         },
         {
            db: "ZDI",
            id: "ZDI-21-1124",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41540",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-41540",
            trust: 2.4,
         },
         {
            db: "ZDI",
            id: "ZDI-21-1124",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-728618",
            trust: 1.7,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-13776",
            trust: 0.7,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-287-06",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021092905",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3454",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1836",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-41540",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1124",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41540",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1836",
         },
         {
            db: "NVD",
            id: "CVE-2021-41540",
         },
      ],
   },
   id: "VAR-202109-1122",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.19128205,
   },
   last_update_date: "2022-05-04T07:14:16.268000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "",
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            title: "Siemens Solid Edge Remediation of resource management error vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=164365",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=3b85ee03e935aff52e55e7402b3926a1",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1124",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41540",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1836",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-416",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41540",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-1124/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.7,
            url: "https://www.siemens.com/cert/advisories/https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-41540",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-287-06",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3454",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021092905",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/416.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1124",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41540",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1836",
         },
         {
            db: "NVD",
            id: "CVE-2021-41540",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-1124",
         },
         {
            db: "VULMON",
            id: "CVE-2021-41540",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-1836",
         },
         {
            db: "NVD",
            id: "CVE-2021-41540",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1124",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41540",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-09-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1836",
         },
         {
            date: "2021-09-28T12:15:00",
            db: "NVD",
            id: "CVE-2021-41540",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-09-30T00:00:00",
            db: "ZDI",
            id: "ZDI-21-1124",
         },
         {
            date: "2021-10-01T00:00:00",
            db: "VULMON",
            id: "CVE-2021-41540",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-10-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-1836",
         },
         {
            date: "2021-10-01T13:54:00",
            db: "NVD",
            id: "CVE-2021-41540",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-1836",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens Solid Edge Viewer OBJ File Parsing Use-After-Free Remote Code Execution Vulnerability",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-1124",
         },
      ],
      trust: 0.7,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202101-1947
Vulnerability from variot

A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied data when parsing DFT files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. Solid Edge Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DFT files. Solid Edge is a combination of software tools to solve various product development processes

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1947",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2021",
         },
         {
            model: "solid edge",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "se2020",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2021mp2",
         },
         {
            model: "solid edge",
            scope: "eq",
            trust: 0.8,
            vendor: "シーメンス",
            version: "se2020mp12",
         },
         {
            model: "solid edge viewer",
            scope: null,
            trust: 0.7,
            vendor: "siemens",
            version: null,
         },
         {
            model: "solid edge <se2021mp2",
            scope: null,
            trust: 0.6,
            vendor: "siemens",
            version: null,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-077",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02631",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015355",
         },
         {
            db: "NVD",
            id: "CVE-2020-28386",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "se2020",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack10:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack11:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack8:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2020:maintenance_pack9:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28386",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "rgod",
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-077",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2020-28386",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2020-28386",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "CNVD-2021-02631",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-28386",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "ZDI",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-28386",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 0.7,
                  userInteraction: "REQUIRED",
                  vectorString: "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-28386",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "ZDI",
                  id: "CVE-2020-28386",
                  trust: 0.7,
                  value: "HIGH",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2021-02631",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202101-833",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-077",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02631",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015355",
         },
         {
            db: "NVD",
            id: "CVE-2020-28386",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-833",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied data when parsing DFT files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. Solid Edge Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DFT files. Solid Edge is a combination of software tools to solve various product development processes",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28386",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015355",
         },
         {
            db: "ZDI",
            id: "ZDI-21-077",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02631",
         },
      ],
      trust: 2.79,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-28386",
            trust: 3.7,
         },
         {
            db: "ZDI",
            id: "ZDI-21-077",
            trust: 3.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-012-04",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-979834",
            trust: 2.2,
         },
         {
            db: "ZDI",
            id: "ZDI-21-060",
            trust: 1.6,
         },
         {
            db: "JVN",
            id: "JVNVU91685542",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015355",
            trust: 0.8,
         },
         {
            db: "ZDI_CAN",
            id: "ZDI-CAN-12050",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02631",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0126",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-833",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-077",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02631",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015355",
         },
         {
            db: "NVD",
            id: "CVE-2020-28386",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-833",
         },
      ],
   },
   id: "VAR-202101-1947",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-02631",
         },
      ],
      trust: 0.06,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "IoT",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2021-02631",
         },
      ],
   },
   last_update_date: "2023-12-18T11:00:33.348000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-979834",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
         },
         {
            title: "Siemens has issued an update to correct this vulnerability.",
            trust: 0.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-04",
         },
         {
            title: "Patch for Solid Edge has an unspecified vulnerability (CNVD-2021-02631)",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/244036",
         },
         {
            title: "Solid Edge SEMP Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139347",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-077",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02631",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015355",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-833",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015355",
         },
         {
            db: "NVD",
            id: "CVE-2020-28386",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.7,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-04",
         },
         {
            trust: 2.4,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-077/",
         },
         {
            trust: 2.2,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
         },
         {
            trust: 1.6,
            url: "https://www.zerodayinitiative.com/advisories/zdi-21-060/",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-28386",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu91685542/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0126/",
         },
      ],
      sources: [
         {
            db: "ZDI",
            id: "ZDI-21-077",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02631",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015355",
         },
         {
            db: "NVD",
            id: "CVE-2020-28386",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-833",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "ZDI",
            id: "ZDI-21-077",
         },
         {
            db: "CNVD",
            id: "CNVD-2021-02631",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-015355",
         },
         {
            db: "NVD",
            id: "CVE-2020-28386",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202101-833",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-01-20T00:00:00",
            db: "ZDI",
            id: "ZDI-21-077",
         },
         {
            date: "2021-01-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-02631",
         },
         {
            date: "2021-09-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-015355",
         },
         {
            date: "2021-01-12T21:15:17.963000",
            db: "NVD",
            id: "CVE-2020-28386",
         },
         {
            date: "2021-01-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202101-833",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-01-20T00:00:00",
            db: "ZDI",
            id: "ZDI-21-077",
         },
         {
            date: "2021-01-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2021-02631",
         },
         {
            date: "2021-09-17T05:28:00",
            db: "JVNDB",
            id: "JVNDB-2020-015355",
         },
         {
            date: "2021-12-10T21:44:49.393000",
            db: "NVD",
            id: "CVE-2020-28386",
         },
         {
            date: "2021-08-16T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202101-833",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202101-833",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Solid Edge  Out-of-bounds Vulnerability in Microsoft",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-015355",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202101-833",
         },
      ],
      trust: 0.6,
   },
}

CVE-2024-34773 (GCVE-0-2024-34773)
Vulnerability from cvelistv5
Published
2024-05-14 10:03
Modified
2024-08-02 02:59
Summary
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 2). The affected applications contain a stack overflow vulnerability while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
Impacted products
Vendor Product Version
Siemens Solid Edge Version: 0   < V224.0 Update 2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "solid_edge",
                  vendor: "siemens",
                  versions: [
                     {
                        lessThan: "v224.0",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-34773",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-14T12:52:32.689860Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-06T19:13:41.500Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T02:59:22.611Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V224.0 Update 2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 2). The affected applications contain a stack overflow vulnerability while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-121",
                     description: "CWE-121: Stack-based Buffer Overflow",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-15T07:24:59.346Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2024-34773",
      datePublished: "2024-05-14T10:03:14.388Z",
      dateReserved: "2024-05-08T14:32:55.043Z",
      dateUpdated: "2024-08-02T02:59:22.611Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2024-33492 (GCVE-0-2024-33492)
Vulnerability from cvelistv5
Published
2024-05-14 10:02
Modified
2024-08-02 02:36
Summary
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
Impacted products
Vendor Product Version
Siemens Solid Edge Version: 0   < V224.0 Update 5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "solid_edge",
                  vendor: "siemens",
                  versions: [
                     {
                        lessThan: "v224.0",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-33492",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-14T12:58:08.945935Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-06T17:41:29.922Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T02:36:03.981Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V224.0 Update 5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "CWE-125: Out-of-bounds Read",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-15T07:24:41.512Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2024-33492",
      datePublished: "2024-05-14T10:02:54.177Z",
      dateReserved: "2024-04-23T09:42:14.997Z",
      dateUpdated: "2024-08-02T02:36:03.981Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2024-33491 (GCVE-0-2024-33491)
Vulnerability from cvelistv5
Published
2024-05-14 10:02
Modified
2024-08-02 02:36
Summary
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
Impacted products
Vendor Product Version
Siemens Solid Edge Version: 0   < V224.0 Update 5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "solid_edge",
                  vendor: "siemens",
                  versions: [
                     {
                        lessThan: "v224.0",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-33491",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-14T12:58:35.535739Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-06T17:41:20.103Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T02:36:02.808Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V224.0 Update 5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "CWE-125: Out-of-bounds Read",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-15T07:24:40.353Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2024-33491",
      datePublished: "2024-05-14T10:02:52.964Z",
      dateReserved: "2024-04-23T09:42:14.997Z",
      dateUpdated: "2024-08-02T02:36:02.808Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2024-33489 (GCVE-0-2024-33489)
Vulnerability from cvelistv5
Published
2024-05-14 10:02
Modified
2024-08-02 02:36
Summary
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
Impacted products
Vendor Product Version
Siemens Solid Edge Version: 0   < V224.0 Update 5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "solid_edge",
                  vendor: "siemens",
                  versions: [
                     {
                        lessThan: "v224.0",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-33489",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-14T12:59:06.250608Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-06T17:40:33.282Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T02:36:02.819Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V224.0 Update 5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-15T07:24:38.052Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2024-33489",
      datePublished: "2024-05-14T10:02:50.566Z",
      dateReserved: "2024-04-23T09:42:14.997Z",
      dateUpdated: "2024-08-02T02:36:02.819Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2022-47967 (GCVE-0-2022-47967)
Vulnerability from cvelistv5
Published
2023-01-10 11:39
Modified
2025-04-08 14:21
Summary
A vulnerability has been identified in Solid Edge (All versions < V2023 MP1). The DOCMGMT.DLL contains a memory corruption vulnerability that could be triggered while parsing files in different file formats such as PAR, ASM, DFT. This could allow an attacker to execute code in the context of the current process.
Impacted products
Vendor Product Version
Siemens Solid Edge Version: All versions < V2023 MP1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:02:36.623Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-997779.pdf",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-47967",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-08T14:20:54.033138Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-08T14:21:08.390Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V2023 MP1",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in Solid Edge (All versions < V2023 MP1). The DOCMGMT.DLL contains a memory corruption vulnerability that could be triggered while parsing files in different file formats such as PAR, ASM, DFT. This could allow an attacker to execute code in the context of the current process.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-119",
                     description: "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-10T11:39:48.279Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-997779.pdf",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2022-47967",
      datePublished: "2023-01-10T11:39:48.279Z",
      dateReserved: "2022-12-27T14:29:45.815Z",
      dateUpdated: "2025-04-08T14:21:08.390Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2022-47935 (GCVE-0-2022-47935)
Vulnerability from cvelistv5
Published
2023-01-10 11:39
Modified
2025-04-08 20:04
Summary
A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains a memory corruption vulnerability while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19078)
Impacted products
Vendor Product Version
Siemens JT Open Version: All versions < V11.1.1.0
Create a notification for this product.
   Siemens JT Utilities Version: All versions < V13.1.1.0
Create a notification for this product.
   Siemens Solid Edge Version: All versions < V2023
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:02:36.565Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-936212.pdf",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-47935",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-08T20:03:09.102680Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-08T20:04:25.738Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "JT Open",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V11.1.1.0",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "JT Utilities",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V13.1.1.0",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V2023",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains a memory corruption vulnerability while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19078)",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-119",
                     description: "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-10T11:39:47.238Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-936212.pdf",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2022-47935",
      datePublished: "2023-01-10T11:39:47.238Z",
      dateReserved: "2022-12-23T11:05:07.688Z",
      dateUpdated: "2025-04-08T20:04:25.738Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2024-33493 (GCVE-0-2024-33493)
Vulnerability from cvelistv5
Published
2024-05-14 10:02
Modified
2024-08-02 02:36
Summary
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
Impacted products
Vendor Product Version
Siemens Solid Edge Version: 0   < V224.0 Update 5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "solid_edge",
                  vendor: "siemens",
                  versions: [
                     {
                        lessThan: "v224.0",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-33493",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-14T12:57:41.588945Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-06T17:41:46.045Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T02:36:02.831Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V224.0 Update 5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "CWE-125: Out-of-bounds Read",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-15T07:24:42.660Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2024-33493",
      datePublished: "2024-05-14T10:02:55.387Z",
      dateReserved: "2024-04-23T09:42:14.998Z",
      dateUpdated: "2024-08-02T02:36:02.831Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2024-34772 (GCVE-0-2024-34772)
Vulnerability from cvelistv5
Published
2024-05-14 10:03
Modified
2024-08-02 02:59
Summary
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 4). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
Impacted products
Vendor Product Version
Siemens Solid Edge Version: 0   < V224.0 Update 4
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "solid_edge",
                  vendor: "siemens",
                  versions: [
                     {
                        lessThan: "v224.0",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-34772",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-14T12:54:19.687164Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-06T19:13:23.089Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T02:59:22.015Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V224.0 Update 4",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 4). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "CWE-125: Out-of-bounds Read",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-15T07:24:58.168Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2024-34772",
      datePublished: "2024-05-14T10:03:13.155Z",
      dateReserved: "2024-05-08T14:32:55.042Z",
      dateUpdated: "2024-08-02T02:59:22.015Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2022-37864 (GCVE-0-2022-37864)
Vulnerability from cvelistv5
Published
2022-10-11 00:00
Modified
2024-08-03 10:37
Severity ?
Summary
A vulnerability has been identified in Solid Edge (All Versions < SE2022MP9). The affected application contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted DWG files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17627)
Impacted products
Vendor Product Version
Siemens Solid Edge Version: All Versions < SE2022MP9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T10:37:42.243Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-258115.pdf",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All Versions < SE2022MP9",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in Solid Edge (All Versions < SE2022MP9). The affected application contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted DWG files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17627)",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-11T00:00:00",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-258115.pdf",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2022-37864",
      datePublished: "2022-10-11T00:00:00",
      dateReserved: "2022-08-08T00:00:00",
      dateUpdated: "2024-08-03T10:37:42.243Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2024-33490 (GCVE-0-2024-33490)
Vulnerability from cvelistv5
Published
2024-05-14 10:02
Modified
2024-08-02 02:36
Summary
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
Impacted products
Vendor Product Version
Siemens Solid Edge Version: 0   < V224.0 Update 5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "solid_edge",
                  vendor: "siemens",
                  versions: [
                     {
                        lessThan: "v224.0",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-33490",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-14T12:48:54.384273Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-06T17:40:58.720Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T02:36:03.385Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V224.0 Update 5",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "CWE-125: Out-of-bounds Read",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-15T07:24:39.203Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2024-33490",
      datePublished: "2024-05-14T10:02:51.775Z",
      dateReserved: "2024-04-23T09:42:14.997Z",
      dateUpdated: "2024-08-02T02:36:03.385Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2023-49125 (GCVE-0-2023-49125)
Vulnerability from cvelistv5
Published
2024-02-13 08:59
Modified
2024-08-02 21:46
Summary
A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.263), Parasolid V35.1 (All versions < V35.1.252), Parasolid V36.0 (All versions < V36.0.198), Solid Edge SE2023 (All versions < V223.0 Update 11), Solid Edge SE2024 (All versions < V224.0 Update 3). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted files containing XT format. This could allow an attacker to execute code in the context of the current process.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T21:46:29.325Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-797296.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-382651.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Parasolid V35.0",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V35.0.263",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "Parasolid V35.1",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V35.1.252",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "Parasolid V36.0",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V36.0.198",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "Solid Edge SE2023",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V223.0 Update 11",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "Solid Edge SE2024",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V224.0 Update 3",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.263), Parasolid V35.1 (All versions < V35.1.252), Parasolid V36.0 (All versions < V36.0.198), Solid Edge SE2023 (All versions < V223.0 Update 11), Solid Edge SE2024 (All versions < V224.0 Update 3). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted files containing XT format. This could allow an attacker to execute code in the context of the current process.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-125",
                     description: "CWE-125: Out-of-bounds Read",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-15T07:23:49.243Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-797296.html",
            },
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-382651.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2023-49125",
      datePublished: "2024-02-13T08:59:57.813Z",
      dateReserved: "2023-11-22T14:43:13.524Z",
      dateUpdated: "2024-08-02T21:46:29.325Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-44014 (GCVE-0-2021-44014)
Vulnerability from cvelistv5
Published
2021-12-14 12:06
Modified
2024-08-04 04:10
Summary
A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains a use-after-free vulnerability that could be triggered while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15057, ZDI-CAN-19081)
Impacted products
Vendor Product Version
Siemens JT Open Version: All versions < V11.1.1.0
Create a notification for this product.
   Siemens JT Utilities Version: All versions < V13.1.1.0
Create a notification for this product.
   Siemens Solid Edge Version: All versions < V2023
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T04:10:17.199Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-936212.pdf",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "JT Open",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V11.1.1.0",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "JT Utilities",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V13.1.1.0",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V2023",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains a use-after-free vulnerability that could be triggered while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15057, ZDI-CAN-19081)",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-416",
                     description: "CWE-416: Use After Free",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-10T11:39:18.959Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf",
            },
            {
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-936212.pdf",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2021-44014",
      datePublished: "2021-12-14T12:06:50",
      dateReserved: "2021-11-18T00:00:00",
      dateUpdated: "2024-08-04T04:10:17.199Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-44002 (GCVE-0-2021-44002)
Vulnerability from cvelistv5
Published
2021-12-14 12:06
Modified
2024-08-04 04:10
Summary
A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15058, ZDI-CAN-19076, ZDI-CAN-19077)
Impacted products
Vendor Product Version
Siemens JT Open Version: All versions < V11.1.1.0
Create a notification for this product.
   Siemens JT Utilities Version: All versions < V13.1.1.0
Create a notification for this product.
   Siemens Solid Edge Version: All versions < V2023
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T04:10:17.089Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-936212.pdf",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "JT Open",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V11.1.1.0",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "JT Utilities",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V13.1.1.0",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V2023",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15058, ZDI-CAN-19076, ZDI-CAN-19077)",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-787",
                     description: "CWE-787: Out-of-bounds Write",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-10T11:39:17.904Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf",
            },
            {
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-936212.pdf",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2021-44002",
      datePublished: "2021-12-14T12:06:41",
      dateReserved: "2021-11-18T00:00:00",
      dateUpdated: "2024-08-04T04:10:17.089Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2024-34771 (GCVE-0-2024-34771)
Vulnerability from cvelistv5
Published
2024-05-14 10:03
Modified
2024-08-02 02:59
Summary
A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 2). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
Impacted products
Vendor Product Version
Siemens Solid Edge Version: 0   < V224.0 Update 2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "solid_edge",
                  vendor: "siemens",
                  versions: [
                     {
                        lessThan: "v224.0",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-34771",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-14T12:56:57.357762Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-06T19:11:49.290Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T02:59:22.244Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "Solid Edge",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V224.0 Update 2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in Solid Edge (All versions < V224.0 Update 2). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "CWE-122: Heap-based Buffer Overflow",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-05-15T07:24:57.002Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-589937.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2024-34771",
      datePublished: "2024-05-14T10:03:11.953Z",
      dateReserved: "2024-05-08T14:32:55.042Z",
      dateUpdated: "2024-08-02T02:59:22.244Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}