Feb. 14, 2023, midnight |

Siemens ProductCERT Security Advisories cert-portal.siemens.com

Solid Edge is affected by multiple memory corruption vulnerabilities that could be triggered when the application reads specially crafted files in various formats such as X_B, DWG, DXF, STL, STP, SLDPRT and PAR format. If a user is tricked to open a malicious file with the affected applications, an attacker could leverage the vulnerability to crash the application, extract data or potentially lead to arbitrary code execution.


Siemens has released updates for the affected products and recommends to update to …

application applications code code execution corruption crash data dwg edge extract file files malicious memory memory corruption parsing siemens solid ssa updates vulnerabilities vulnerability

More from cert-portal.siemens.com / Siemens ProductCERT Security Advisories

Security Architect

@ Alter Solutions | Lisboa, Portugal

Information Security Program Manager

@ Fisher Investments | Tampa, FL, United States

Digital Security Infrastructure Manager

@ Wizz Air | Budapest, HU, H-1103

Sr. Solution Consultant

@ Highspot | Sydney

Cyber Security Analyst III

@ Love's Travel Stops | Oklahoma City, OK, US, 73120

Lead Security Engineer

@ JPMorgan Chase & Co. | Tampa, FL, United States