{"api_version":"1","generated_at":"2026-04-24T00:50:26+00:00","cve":"CVE-2021-37180","urls":{"html":"https://cve.report/CVE-2021-37180","api":"https://cve.report/api/cve/CVE-2021-37180.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-37180","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-37180"},"summary":{"title":"CVE-2021-37180","description":"A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). The PSKERNEL.dll library lacks proper validation while parsing user-supplied OBJ files that could cause an out of bounds access to an uninitialized pointer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13775)","state":"PUBLIC","assigner":"productcert@siemens.com","published_at":"2021-08-10 11:15:00","updated_at":"2021-12-16 18:20:00"},"problem_types":["CWE-824"],"metrics":[],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1113/","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-1113/","refsource":"MISC","tags":[],"title":"ZDI-21-1113 | Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-818688.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-818688.pdf","refsource":"MISC","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-37180","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37180","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"37180","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"solid_edge_se2021","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"37180","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"solid_edge_se2021_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"productcert@siemens.com","ID":"CVE-2021-37180","STATE":"PUBLIC"},"data_format":"MITRE","data_version":"4.0","data_type":"CVE","affects":{"vendor":{"vendor_data":[{"vendor_name":"Siemens","product":{"product_data":[{"product_name":"Solid Edge SE2021","version":{"version_data":[{"version_value":"All Versions < SE2021MP7"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-824: Access of Uninitialized Pointer"}]}]},"description":{"description_data":[{"lang":"eng","value":"A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). The PSKERNEL.dll library lacks proper validation while parsing user-supplied OBJ files that could cause an out of bounds access to an uninitialized pointer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13775)"}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-818688.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-818688.pdf"},{"refsource":"MISC","name":"https://www.zerodayinitiative.com/advisories/ZDI-21-1113/","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1113/"}]}},"nvd":{"publishedDate":"2021-08-10 11:15:00","lastModifiedDate":"2021-12-16 18:20:00","problem_types":["CWE-824"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:siemens:solid_edge_se2021_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"se2021mp7","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:siemens:solid_edge_se2021:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"37180","Ordinal":"212758","Title":"CVE-2021-37180","CVE":"CVE-2021-37180","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"37180","Ordinal":"1","NoteData":"A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). The PSKERNEL.dll library lacks proper validation while parsing user-supplied OBJ files that could cause an out of bounds access to an uninitialized pointer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13775)","Type":"Description","Title":null},{"CveYear":"2021","CveId":"37180","Ordinal":"2","NoteData":"2021-08-10","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"37180","Ordinal":"3","NoteData":"2021-09-24","Type":"Other","Title":"Modified"}]}}}