Multiple vulnerabilities in Siemens NX 1953 and NX 1980 Series



Published: 2021-11-10
Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-41535
CVE-2021-41538
CWE-ID CWE-416
CWE-824
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
NX 1980
Hardware solutions / Routers for home users

NX 1953
Hardware solutions / Routers for home users

Vendor Siemens

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU56916

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-41535

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error while parsing OBJ files. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

NX 1980: before 1988

NX 1953: before 1973.3700

External links

http://cert-portal.siemens.com/productcert/txt/ssa-328042.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Access of Uninitialized Pointer

EUVDB-ID: #VU56919

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-41538

CWE-ID: CWE-824 - Access of Uninitialized Pointer

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information on the system.

The vulnerability exists due to an uninitialized pointer while parsing OBJ files. A remote attacker can trick a victim to open a specially crafted file and gain access to sensitive information on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

NX 1980: before 1988

NX 1953: before 1973.3700

External links

http://cert-portal.siemens.com/productcert/txt/ssa-328042.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###