Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-25670

EPSS 0.37% · P59
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-25670

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in Tecnomatix RobotExpert (All versions < V16.1). Affected applications lack proper validation of user-supplied data when parsing CELL files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12608)
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨界内存写
Source: NVD (National Vulnerability Database)
Vulnerability Title
siemens Tecnomatix RobotExpert 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
siemens Tecnomatix RobotExpert是德国西门子(siemens)公司的一个应用软件。提供支持独特的行业应用,例如贴装,电弧焊,抛光,胶合和其他。。 Tecnomatix RobotExpert 16.1版本之前存在缓冲区错误漏洞,该漏洞源于应用程序在解析单元格文件时缺乏对用户提供的数据的适当验证,攻击者可利用该漏洞在当前进程的上下文中执行代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SiemensTecnomatix RobotExpert All versions < V16.1 -

II. Public POCs for CVE-2021-25670

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-25670

登录查看更多情报信息。

Same Patch Batch · Siemens · 2021-04-22 · 19 CVEs total

CVE-2020-252448.4 HIGHSiemens LOGO! Soft Comfort 代码问题漏洞
CVE-2020-270098.1 HIGH多款Siemens产品 缓冲区错误漏洞
CVE-2020-157958.1 HIGH多款siemens产品 缓冲区错误漏洞
CVE-2021-256637.5 HIGHSiemens Nucleus 安全漏洞
CVE-2021-256647.5 HIGHSiemens Nucleus 安全漏洞
CVE-2020-277376.5 MEDIUM多款siemens产品 缓冲区错误漏洞
CVE-2020-277366.5 MEDIUM多款siemens产品 缓冲区错误漏洞
CVE-2020-277386.5 MEDIUM多款siemens产品 缓冲区错误漏洞
CVE-2021-256775.3 MEDIUM多款Siemens产品 安全特征问题漏洞
CVE-2020-252435.1 MEDIUMSiemens LOGO! Soft Comfort 路径遍历漏洞
CVE-2021-25668Siemens Web Server缓冲区错误漏洞
CVE-2020-26997Siemens Solid Edge 安全漏洞
CVE-2021-25669Siemens Web Server 缓冲区错误漏洞
CVE-2021-27393Nucleus ReadyStart安全特征问题漏洞
CVE-2021-27392Siemens Open Network Bridge 信任管理问题漏洞
CVE-2021-27389Siemens Digital Industries Software Opcenter Quality 安全漏洞
CVE-2021-27382Siemens Solid Edge 缓冲区错误漏洞
CVE-2021-25678Siemens Solid Edge 缓冲区错误漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2021-25670

No comments yet


Leave a comment