CVE-2021-34326Heap-based Buffer Overflow in Siemens Jt2go

Severity
7.8HIGHNVD
EPSS
0.4%
top 36.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 13
Latest updateMay 24

Description

A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter Visualization (All versions < V13.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13422)

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5siemens/solid_edge_se2021All Versions < SE2021MP5
NVDsiemens/solid_edge< se2021+1
CVEListV5siemens/teamcenter_visualizationAll versions < V13.2
NVDsiemens/jt2go< 13.2.0

🔴Vulnerability Details

2
GHSA
GHSA-cm7m-hh39-78r7: A vulnerability has been identified in JT2Go (All versions < V132022-05-24
CVEList
CVE-2021-34326: A vulnerability has been identified in JT2Go (All versions < V132021-07-13
CVE-2021-34326 — Heap-based Buffer Overflow in Siemens | cvebase