Description
A vulnerability has been identified in JT2Go (All versions < V13.2.0.7), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V13.1 (All versions < V13.1.0.9), Teamcenter Visualization V13.2 (All versions < V13.2.0.7), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15053)
References (2)
Core 2
Core References
Patch, Vendor Advisory x_refsource_misc
https://cert-portal.siemens.com/productcert/pdf/ssa-301589.pdf
Third Party Advisory, VDB Entry x_refsource_misc
https://www.zerodayinitiative.com/advisories/ZDI-22-335/
Scores
CVSS v3
7.8
EPSS
0.0029
EPSS Percentile
52.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-122
CWE-787
Status
published
Products (5)
siemens/jt2go
< 13.2.0.7
siemens/solid_edge
se2021 (9 CPE variants)
siemens/solid_edge
se2022
siemens/teamcenter_visualization
13.1.0
siemens/teamcenter_visualization
13.2.0 - 13.2.0.7
Published
Feb 09, 2022
Tracked Since
Feb 18, 2026