Impact
This vulnerability is an out‑of‑bounds write that occurs during the parsing of a Labcenter Electronics Proteus PDSPRJ file. The lack of proper validation of user‑supplied data allows a crafted file to overwrite memory beyond the allocated buffer, enabling the attacker to execute arbitrary code in the context of the current user. The flaw represents a classic buffer overflow scenario, threatening confidentiality, integrity, and availability of the affected system.
Affected Systems
The affected product is Labcenter Electronics Proteus. No specific version information is listed, so all releases that process PDSPRJ files are potentially vulnerable.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity and the problem is observable only when the user opens a malicious PDSPRJ file or visits a page that triggers its processing. The likely attack vector is inferred to be a malicious project file presented to a user. Although EPSS data is not available and the vulnerability is not part of the CISA KEV catalog, the high severity and the exploitation impact of remote code execution suggest a significant security risk for any user who interacts with untrusted files.
OpenCVE Enrichment