{"api_version":"1","generated_at":"2026-04-24T00:31:52+00:00","cve":"CVE-2021-22647","urls":{"html":"https://cve.report/CVE-2021-22647","api":"https://cve.report/api/cve/CVE-2021-22647.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-22647","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-22647"},"summary":{"title":"CVE-2021-22647","description":"Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to multiple out-of-bounds write issues while processing project files, which may allow an attacker to execute arbitrary code.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2021-02-23 04:15:00","updated_at":"2021-03-23 17:41:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-318/","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-318/","refsource":"MISC","tags":[],"title":"ZDI-21-318 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01","name":"https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01","refsource":"MISC","tags":["Third Party Advisory","US Government Resource"],"title":"Luxion KeyShot | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-320/","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-320/","refsource":"MISC","tags":[],"title":"ZDI-21-320 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-321/","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-321/","refsource":"MISC","tags":[],"title":"ZDI-21-321 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-326/","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-326/","refsource":"MISC","tags":[],"title":"ZDI-21-326 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-322/","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-322/","refsource":"MISC","tags":[],"title":"ZDI-21-322 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-22647","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22647","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"22647","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyshot","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22647","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyshot","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22647","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyshot_network_rendering","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22647","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyshot_network_rendering","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22647","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyshot_viewer","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22647","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyshot_viewer","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22647","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyvr","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22647","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyvr","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22647","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"solid_edge_se2020","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22647","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"solid_edge_se2020_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22647","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"solid_edge_se2021","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22647","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"solid_edge_se2021_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-22647","ASSIGNER":"ics-cert@hq.dhs.gov","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Luxion KeyShot","version":{"version_data":[{"version_value":"versions prior to 10.1"}]}},{"product_name":"Luxion KeyShot Viewer","version":{"version_data":[{"version_value":"versions prior to 10.1"}]}},{"product_name":"Luxion KeyShot Network Rendering","version":{"version_data":[{"version_value":"versions prior to 10.1"}]}},{"product_name":"Luxion KeyVR","version":{"version_data":[{"version_value":"versions prior to 10.1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"OUT-OF-BOUNDS WRITE CWE-787"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01","url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-322/","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-322/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-321/","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-321/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-320/","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-320/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-326/","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-326/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-318/","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-318/"}]},"description":{"description_data":[{"lang":"eng","value":"Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to multiple out-of-bounds write issues while processing project files, which may allow an attacker to execute arbitrary code."}]}},"nvd":{"publishedDate":"2021-02-23 04:15:00","lastModifiedDate":"2021-03-23 17:41:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:luxion:keyshot_network_rendering:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:luxion:keyvr:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:luxion:keyshot_viewer:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:siemens:solid_edge_se2020_firmware:*:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:siemens:solid_edge_se2020:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:siemens:solid_edge_se2021_firmware:*:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:siemens:solid_edge_se2021:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"22647","Ordinal":"197352","Title":"CVE-2021-22647","CVE":"CVE-2021-22647","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"22647","Ordinal":"1","NoteData":"Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to multiple out-of-bounds write issues while processing project files, which may allow an attacker to execute arbitrary code.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"22647","Ordinal":"2","NoteData":"2021-02-22","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"22647","Ordinal":"3","NoteData":"2021-03-16","Type":"Other","Title":"Modified"}]}}}