{"api_version":"1","generated_at":"2026-04-24T00:32:33+00:00","cve":"CVE-2021-22649","urls":{"html":"https://cve.report/CVE-2021-22649","api":"https://cve.report/api/cve/CVE-2021-22649.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-22649","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-22649"},"summary":{"title":"CVE-2021-22649","description":"Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 have multiple NULL pointer dereference issues while processing project files, which may allow an attacker to execute arbitrary code.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2021-02-23 04:15:00","updated_at":"2022-10-25 16:28:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01","name":"https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01","refsource":"MISC","tags":["Third Party Advisory","US Government Resource"],"title":"Luxion KeyShot | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-317/","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-317/","refsource":"MISC","tags":[],"title":"ZDI-21-317 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"0"},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-325/","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-325/","refsource":"MISC","tags":[],"title":"ZDI-21-325 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-22649","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22649","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"22649","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyshot","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22649","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyshot","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22649","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyshot_network_rendering","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22649","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyshot_network_rendering","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22649","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyshot_viewer","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22649","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyshot_viewer","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22649","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyvr","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22649","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"luxion","cpe5":"keyvr","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22649","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"solid_edge_se2020","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22649","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"solid_edge_se2020_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22649","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"solid_edge_se2021","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22649","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"solid_edge_se2021_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-22649","ASSIGNER":"ics-cert@hq.dhs.gov","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Luxion KeyShot","version":{"version_data":[{"version_value":"versions prior to 10.1"}]}},{"product_name":"Luxion KeyShot Viewer","version":{"version_data":[{"version_value":"versions prior to 10.1"}]}},{"product_name":"Luxion KeyShot Network Rendering","version":{"version_data":[{"version_value":"versions prior to 10.1"}]}},{"product_name":"Luxion KeyVR","version":{"version_data":[{"version_value":"versions prior to 10.1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"UNTRUSTED POINTER DEREFERENCE CWE-822"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01","url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-317/","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-317/"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-325/","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-325/"}]},"description":{"description_data":[{"lang":"eng","value":"Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 have multiple NULL pointer dereference issues while processing project files, which may allow an attacker to execute arbitrary code."}]}},"nvd":{"publishedDate":"2021-02-23 04:15:00","lastModifiedDate":"2022-10-25 16:28:00","problem_types":["CWE-119"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:luxion:keyshot_network_rendering:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:luxion:keyvr:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:luxion:keyshot_viewer:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:siemens:solid_edge_se2020_firmware:*:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:siemens:solid_edge_se2020:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:siemens:solid_edge_se2021_firmware:*:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:siemens:solid_edge_se2021:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"22649","Ordinal":"197354","Title":"CVE-2021-22649","CVE":"CVE-2021-22649","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"22649","Ordinal":"1","NoteData":"Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 have multiple NULL pointer dereference issues while processing project files, which may allow an attacker to execute arbitrary code.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"22649","Ordinal":"2","NoteData":"2021-02-22","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"22649","Ordinal":"3","NoteData":"2021-03-16","Type":"Other","Title":"Modified"}]}}}