A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 12), Solid Edge SE2025 (All versions < V225.0 Update 3). The affected application contains an out of bounds write past the end of an allocated buffer while parsing X_T data or a specially crafted file in X_T format.
This could allow an attacker to execute code in the context of the current process.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-52268 A vulnerability has been identified in Parasolid V36.1 (All versions < V36.1.225), Parasolid V37.0 (All versions < V37.0.173). The affected application contains an out of bounds write past the end of an allocated buffer while parsing X_T data or a specially crafted file in X_T format. This could allow an attacker to execute code in the context of the current process.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 29 Oct 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Siemens
Siemens parasolid
Siemens solid Edge Se2024
Siemens solid Edge Se2025
CPEs cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:224.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_00010:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_00011:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0001:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0002:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0003:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0004:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0005:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0006:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0007:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0008:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2024:224.0:update_0009:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2025:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2025:225.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2025:225.0:update_0001:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2025:225.0:update_0002:*:*:*:*:*:*
cpe:2.3:a:siemens:solid_edge_se2025:225.0:update_0003:*:*:*:*:*:*
Vendors & Products Siemens
Siemens parasolid
Siemens solid Edge Se2024
Siemens solid Edge Se2025

Tue, 08 Apr 2025 08:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in Parasolid V36.1 (All versions < V36.1.225), Parasolid V37.0 (All versions < V37.0.173). The affected application contains an out of bounds write past the end of an allocated buffer while parsing X_T data or a specially crafted file in X_T format. This could allow an attacker to execute code in the context of the current process. A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 12), Solid Edge SE2025 (All versions < V225.0 Update 3). The affected application contains an out of bounds write past the end of an allocated buffer while parsing X_T data or a specially crafted file in X_T format. This could allow an attacker to execute code in the context of the current process.
References

Thu, 12 Dec 2024 14:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in Parasolid V36.1 (All versions < V36.1.225), Parasolid V37.0 (All versions < V37.0.173), Parasolid V37.1 (All versions < V37.1.109). The affected applications contain an out of bounds write vulnerability when parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. A vulnerability has been identified in Parasolid V36.1 (All versions < V36.1.225), Parasolid V37.0 (All versions < V37.0.173). The affected application contains an out of bounds write past the end of an allocated buffer while parsing X_T data or a specially crafted file in X_T format. This could allow an attacker to execute code in the context of the current process.
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Dec 2024 14:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in Parasolid V36.1 (All versions < V36.1.225), Parasolid V37.0 (All versions < V37.0.173), Parasolid V37.1 (All versions < V37.1.109). The affected applications contain an out of bounds write vulnerability when parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2025-04-08T08:22:23.402Z

Reserved: 2024-11-28T12:05:26.694Z

Link: CVE-2024-54091

cve-icon Vulnrichment

Updated: 2024-12-10T15:15:29.916Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-10T14:30:47.193

Modified: 2025-10-29T14:21:57.357

Link: CVE-2024-54091

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.