Impact
A stack-based buffer overflow is triggered when Solid Edge SE2026 parses specially crafted PAR files. The overflow can allow an attacker to execute arbitrary code in the process that parses the file, potentially compromising confidentiality, integrity, and availability of the affected system. The flaw represents a classic stack overwrite (CWE‑121).
Affected Systems
Siemens Solid Edge SE2026 versions older than V226.0 Update 5 are susceptible to this vulnerability. All users running these versions should identify their current build and consider remediation.
Risk and Exploitability
The CVSS score of 7.3 indicates moderate to high severity. The EPSS score is not reported, and the vulnerability is not listed in CISA's KEV catalog. Attackers would need to provide a malicious PAR file to the target or have an opportunity to supply one, making local or network-based file delivery a likely attack vector. Due to the lack of an exploit probability metric, organizations should treat the risk as potentially significant, especially in environments where users can open untrusted files.
OpenCVE Enrichment