April 9, 2024, midnight |

Siemens ProductCERT Security Advisories cert-portal.siemens.com

Parasolid is affected by out of bounds read, stack exhaustion and null pointer dereference vulnerabilities that could be triggered when the application reads files in X_T format. If a user is tricked to open a malicious file with the affected applications, an attacker could leverage the vulnerability to perform remote code execution in the context of the current process.


Siemens has released new versions for the affected products and recommends to update to the latest versions.

application applications attacker code code execution exhaustion file files malicious parsing remote code remote code execution ssa stack vulnerabilities vulnerability

More from cert-portal.siemens.com / Siemens ProductCERT Security Advisories

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Security Engineer II- Full stack Java with React

@ JPMorgan Chase & Co. | Hyderabad, Telangana, India

Cybersecurity SecOps

@ GFT Technologies | Mexico City, MX, 11850

Senior Information Security Advisor

@ Sun Life | Sun Life Toronto One York

Contract Special Security Officer (CSSO) - Top Secret Clearance

@ SpaceX | Hawthorne, CA

Early Career Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts