Vulnerabilites related to siemens - nx_1957
cve-2021-41538
Vulnerability from cvelistv5
Published
2021-09-28 11:12
Modified
2024-08-04 03:15
Severity ?
EPSS score ?
Summary
A vulnerability has been identified in NX 1953 Series (All versions < V1973.3700), NX 1980 Series (All versions < V1988), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770).
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1122/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | NX 1953 Series |
Version: All versions < V1973.3700 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:15:29.147Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1122/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NX 1953 Series", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1973.3700" } ] }, { "product": "NX 1980 Series", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1988" } ] }, { "product": "Solid Edge SE2021", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c SE2021MP8" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in NX 1953 Series (All versions \u003c V1973.3700), NX 1980 Series (All versions \u003c V1988), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-824", "description": "CWE-824: Access of Uninitialized Pointer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:32:13", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1122/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-41538", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "NX 1953 Series", "version": { "version_data": [ { "version_value": "All versions \u003c V1973.3700" } ] } }, { "product_name": "NX 1980 Series", "version": { "version_data": [ { "version_value": "All versions \u003c V1988" } ] } }, { "product_name": "Solid Edge SE2021", "version": { "version_data": [ { "version_value": "All versions \u003c SE2021MP8" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in NX 1953 Series (All versions \u003c V1973.3700), NX 1980 Series (All versions \u003c V1988), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-824: Access of Uninitialized Pointer" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1122/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1122/" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-41538", "datePublished": "2021-09-28T11:12:32", "dateReserved": "2021-09-21T00:00:00", "dateUpdated": "2024-08-04T03:15:29.147Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41535
Vulnerability from cvelistv5
Published
2021-09-28 11:12
Modified
2024-08-04 03:15
Severity ?
EPSS score ?
Summary
A vulnerability has been identified in NX 1953 Series (All versions < V1973.3700), NX 1980 Series (All versions < V1988), Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771).
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1119/ | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | NX 1953 Series |
Version: All versions < V1973.3700 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:15:28.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1119/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NX 1953 Series", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1973.3700" } ] }, { "product": "NX 1980 Series", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V1988" } ] }, { "product": "Solid Edge SE2021", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c SE2021MP8" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in NX 1953 Series (All versions \u003c V1973.3700), NX 1980 Series (All versions \u003c V1988), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T11:32:11", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1119/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-41535", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "NX 1953 Series", "version": { "version_data": [ { "version_value": "All versions \u003c V1973.3700" } ] } }, { "product_name": "NX 1980 Series", "version": { "version_data": [ { "version_value": "All versions \u003c V1988" } ] } }, { "product_name": "Solid Edge SE2021", "version": { "version_data": [ { "version_value": "All versions \u003c SE2021MP8" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in NX 1953 Series (All versions \u003c V1973.3700), NX 1980 Series (All versions \u003c V1988), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416: Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1119/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1119/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-41535", "datePublished": "2021-09-28T11:12:29", "dateReserved": "2021-09-21T00:00:00", "dateUpdated": "2024-08-04T03:15:28.435Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-09-28 12:15
Modified
2024-11-21 06:26
Severity ?
Summary
A vulnerability has been identified in NX 1953 Series (All versions < V1973.3700), NX 1980 Series (All versions < V1988), Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771).
References
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf | Patch, Vendor Advisory | |
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf | Patch, Vendor Advisory | |
productcert@siemens.com | https://www.zerodayinitiative.com/advisories/ZDI-21-1119/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-1119/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | solid_edge | * | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | nx_1984_firmware | * | |
siemens | nx_1984 | - | |
siemens | nx_1988_firmware | * | |
siemens | nx_1988 | - | |
siemens | nx_1957_firmware | * | |
siemens | nx_1957 | - | |
siemens | nx_1961_firmware | * | |
siemens | nx_1961 | - | |
siemens | nx_1965_firmware | * | |
siemens | nx_1965 | - | |
siemens | nx_1969_firmware | * | |
siemens | nx_1969 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*", "matchCriteriaId": "576A303A-66CA-4694-AA54-9EB0137C24F1", "versionEndExcluding": "se2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*", "matchCriteriaId": "39D237BD-EE55-4B40-ABC3-194C4BF7C6CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*", "matchCriteriaId": "49F5649A-349C-42C6-AFFF-CEE1ABC14E67", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*", "matchCriteriaId": "756343AA-DB57-40F7-94FA-84BFCDEB6159", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*", "matchCriteriaId": "36B0DD28-653E-4069-AB5A-38F8EFEB36CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*", "matchCriteriaId": "82090774-D894-41C8-82F1-A48A8707E9BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*", "matchCriteriaId": "BD346D22-9B5D-4A50-94E2-1F5C8D391EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*", "matchCriteriaId": "1466AEE0-4A5C-4E2D-80B8-43680F60FC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*", "matchCriteriaId": "A4173D09-C317-45FF-ABA4-39E5592862F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:nx_1984_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A7DCD3A-4441-4E9C-AE47-24098F07DED7", "versionEndExcluding": "1984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:nx_1984:-:*:*:*:*:*:*:*", "matchCriteriaId": "56F1E031-1413-4DE0-8F05-DE1A9386420A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:nx_1988_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C8E5152-5B4A-4290-AED1-3687C6B0AA3E", "versionEndExcluding": "1984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:nx_1988:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC5E1959-9A7C-4952-A3D7-AA36E9E6FAE8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:nx_1957_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2522E4B-461C-4D62-B050-99DB97D6B292", "versionEndExcluding": "1973.3700", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:nx_1957:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC59921-B54E-4FCD-9759-79798F9482E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:nx_1961_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DA28584-9BB3-4548-972F-0E72A20912F7", "versionEndExcluding": "1973.3700", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:nx_1961:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D6529FE-F172-430A-8157-647D624C08E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:nx_1965_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9C5704-F07E-4CC2-B580-D9D8C3A83CCB", "versionEndExcluding": "1973.3700", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:nx_1965:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0BF4B7E-D26F-4D94-AD87-DDB67DD95450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:nx_1969_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E752A21-139F-4A78-BECA-6C2E33007E00", "versionEndExcluding": "1973.3700", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:nx_1969:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A7965A5-E980-4044-A554-0E187883900E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in NX 1953 Series (All versions \u003c V1973.3700), NX 1980 Series (All versions \u003c V1988), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771)." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en NX 1953 Series (Todas las versiones anteriores a V1973.3700), NX 1980 Series (Todas las versiones anteriores a V1988), Solid Edge SE2021 (Todas las versiones anteriores a SE2021MP8). La aplicaci\u00f3n afectada contiene una vulnerabilidad de uso despu\u00e9s de libre al analizar archivos OBJ. Un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual (ZDI-CAN-13771)" } ], "id": "CVE-2021-41535", "lastModified": "2024-11-21T06:26:22.013", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-28T12:15:08.093", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" }, { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "source": "productcert@siemens.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1119/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1119/" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "productcert@siemens.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-28 12:15
Modified
2024-11-21 06:26
Severity ?
Summary
A vulnerability has been identified in NX 1953 Series (All versions < V1973.3700), NX 1980 Series (All versions < V1988), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770).
References
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf | Patch, Vendor Advisory | |
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf | Patch, Vendor Advisory | |
productcert@siemens.com | https://www.zerodayinitiative.com/advisories/ZDI-21-1122/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-1122/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | solid_edge | * | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | solid_edge | se2021 | |
siemens | nx_1984_firmware | * | |
siemens | nx_1984 | - | |
siemens | nx_1988_firmware | * | |
siemens | nx_1988 | - | |
siemens | nx_1957_firmware | * | |
siemens | nx_1957 | - | |
siemens | nx_1961_firmware | * | |
siemens | nx_1961 | - | |
siemens | nx_1965_firmware | * | |
siemens | nx_1965 | - | |
siemens | nx_1969_firmware | * | |
siemens | nx_1969 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*", "matchCriteriaId": "576A303A-66CA-4694-AA54-9EB0137C24F1", "versionEndExcluding": "se2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*", "matchCriteriaId": "39D237BD-EE55-4B40-ABC3-194C4BF7C6CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*", "matchCriteriaId": "49F5649A-349C-42C6-AFFF-CEE1ABC14E67", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*", "matchCriteriaId": "756343AA-DB57-40F7-94FA-84BFCDEB6159", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*", "matchCriteriaId": "36B0DD28-653E-4069-AB5A-38F8EFEB36CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*", "matchCriteriaId": "82090774-D894-41C8-82F1-A48A8707E9BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*", "matchCriteriaId": "BD346D22-9B5D-4A50-94E2-1F5C8D391EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*", "matchCriteriaId": "1466AEE0-4A5C-4E2D-80B8-43680F60FC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*", "matchCriteriaId": "A4173D09-C317-45FF-ABA4-39E5592862F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:nx_1984_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A7DCD3A-4441-4E9C-AE47-24098F07DED7", "versionEndExcluding": "1984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:nx_1984:-:*:*:*:*:*:*:*", "matchCriteriaId": "56F1E031-1413-4DE0-8F05-DE1A9386420A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:nx_1988_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C8E5152-5B4A-4290-AED1-3687C6B0AA3E", "versionEndExcluding": "1984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:nx_1988:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC5E1959-9A7C-4952-A3D7-AA36E9E6FAE8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:nx_1957_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2522E4B-461C-4D62-B050-99DB97D6B292", "versionEndExcluding": "1973.3700", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:nx_1957:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC59921-B54E-4FCD-9759-79798F9482E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:nx_1961_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DA28584-9BB3-4548-972F-0E72A20912F7", "versionEndExcluding": "1973.3700", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:nx_1961:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D6529FE-F172-430A-8157-647D624C08E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:nx_1965_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9C5704-F07E-4CC2-B580-D9D8C3A83CCB", "versionEndExcluding": "1973.3700", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:nx_1965:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0BF4B7E-D26F-4D94-AD87-DDB67DD95450", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:nx_1969_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E752A21-139F-4A78-BECA-6C2E33007E00", "versionEndExcluding": "1973.3700", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:nx_1969:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A7965A5-E980-4044-A554-0E187883900E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in NX 1953 Series (All versions \u003c V1973.3700), NX 1980 Series (All versions \u003c V1988), Solid Edge SE2021 (All versions \u003c SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770)." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en NX 1953 Series (Todas las versiones anteriores a V1973.3700), NX 1980 Series (Todas las versiones anteriores a V1988), Solid Edge SE2021 (Todas las versiones anteriores a SE2021MP8). La aplicaci\u00f3n afectada es vulnerable a la divulgaci\u00f3n de informaci\u00f3n por el acceso inesperado a un puntero no inicializado mientras se analizan los archivos OBJ suministrados por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad para filtrar informaci\u00f3n desde ubicaciones de memoria inesperadas (ZDI-CAN-13770)" } ], "id": "CVE-2021-41538", "lastModified": "2024-11-21T06:26:22.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-28T12:15:08.250", "references": [ { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" }, { "source": "productcert@siemens.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "source": "productcert@siemens.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1122/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-328042.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1122/" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-824" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-824" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }