When loading a specially crafted file, Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are, while processing the extraction of temporary files, suffering from a directory traversal vulnerability, which allows an attacker to store arbitrary scripts into automatic startup folders.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01 | Patch Third Party Advisory US Government Resource |
https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf | Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-324/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2021-02-23 10:15
Updated : 2021-03-23 11:05
NVD link : CVE-2021-22651
Mitre link : CVE-2021-22651
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
siemens
- solid_edge_se2020
- solid_edge_se2021_firmware
- solid_edge_se2020_firmware
- solid_edge_se2021
luxion
- keyshot
- keyshot_viewer
- keyvr
- keyshot_network_rendering