{ "document": { "acknowledgments": [ { "names": [ "Xina1i" ], "organization": "Trend Micro 's Zero Day Initiative", "summary": "reporting these vulnerabilities to CISA" }, { "names": [ "Michael Heinzl" ], "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "summary", "text": "Xina1i, working with Trend Micro 's Zero Day Initiative, and Michael Heinzl reported these vulnerabilities to CISA.", "title": "Summary" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "CISAservicedesk@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-21-222-08 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-222-08.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-222-08 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-222-08" } ], "title": "ICSA-21-222-08_Siemens Solid Edge", "tracking": { "current_release_date": "2021-08-10T00:00:00.000000Z", "generator": { "engine": { "name": "CISA USCert CSAF Generator", "version": "1" } }, "id": "ICSA-21-222-08", "initial_release_date": "2021-08-10T00:00:00.000000Z", "revision_history": [ { "date": "2021-08-10T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-222-08 Siemens Solid Edge" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "< SE2021MP7", "product": { "name": "Solid Edge SE2021: All versions prior to SE2021MP7", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Solid Edge SE2021" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-37178", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "summary", "text": "An XML external entity injection vulnerability in the underlying XML parser could cause the affected application to disclose arbitrary files to remote attackers by loading a specially crafted XML file.CVE-2021-37178 has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:L).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "Solid Edge SE2021: Update to SE2021MP7 or later version (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.sw.siemens.com/" }, { "category": "workaround", "details": "Avoid opening files from unknown sources in Solid Edge.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-222-08" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37178" }, { "cve": "CVE-2021-37179", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The PSKERNEL.DLL library in the affected application lacks proper validation while parsing user-supplied OBJ files that could lead to a use-after-free condition. An attacker could leverage this vulnerability to execute code in the context of the current process.CVE-2021-37179 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Solid Edge SE2021: Update to SE2021MP7 or later version (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.sw.siemens.com/" }, { "category": "workaround", "details": "Avoid opening files from unknown sources in Solid Edge.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-222-08" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37179" }, { "cve": "CVE-2021-37180", "cwe": { "id": "CWE-824", "name": "Access of Uninitialized Pointer" }, "notes": [ { "category": "summary", "text": "The PSKERNEL.DLL library lacks proper validation while parsing user supplied OBJ files that could cause an out-of-bounds access to an uninitialized pointer. An attacker could leverage this vulnerability to execute code in the context of the current process.CVE-2021-37180 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Solid Edge SE2021: Update to SE2021MP7 or later version (login required).", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.sw.siemens.com/" }, { "category": "workaround", "details": "Avoid opening files from unknown sources in Solid Edge.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-222-08" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37180" } ] }