March 14, 2023, midnight |

Siemens ProductCERT Security Advisories cert-portal.siemens.com

Solid Edge is affected by multiple memory corruption vulnerabilities that could be triggered when the application reads specially crafted files in various formats such as X_B, DWG, DXF, STL, STP, SLDPRT and PAR format. If a user is tricked to open a malicious file with the affected applications, an attacker could leverage the vulnerability to crash the application, extract data or potentially lead to arbitrary code execution.


Siemens has released updates for the affected products and recommends to update to …

application applications code code execution corruption crash data dwg edge extract file files malicious memory memory corruption parsing siemens solid ssa update vulnerabilities vulnerability

More from cert-portal.siemens.com / Siemens ProductCERT Security Advisories

Technical Support Engineer - Cyber Security

@ Microsoft | Taipei, Taipei City, Taiwan

Senior Security Engineer

@ Workato | Barcelona, Spain

Regional Cybersecurity Specialist

@ Bayer | Singapore, Singapore, SG

Cyber Security Network Engineer

@ Nine | North Sydney, Australia

Professional, IAM Security

@ Ingram Micro | Manila Shared Services Center

Principal Windows Threat & Detection Security Researcher (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel