An exploit for this vulnerability could be used for privilege escalation or for data hijacking. Parasolid is typically used for the design of products. This vulnerability can be exploited remotely. It is also possible for an attacker to host a malicious X_T file on a server and have users download the file via a browser. Parasolid V34.0 and later are impacted. It is recommended to apply vendor fixes. Parasolid V33.1 and earlier are also impacted. It is recommended to apply vendor fixes. An exploit for this vulnerability could be used for privilege escalation or for data hijacking. Parasolid is typically used for the design of products. This vulnerability can be exploited remotely. It is also possible for an attacker to host a malicious X_T file on a server and have users download the file via a browser. Parasolid V34.0 and later are impacted. It is recommended to apply vendor fixes. Parasolid V33.1 and earlier are also impacted. It is recommended to apply vendor fixes. Further information on fixes is available here. An exploit for this vulnerability could be used for privilege escalation or for data hijacking. Parasolid is typically used for the design of products. This vulnerability can be exploited remotely. It is also possible for an attacker to host a malicious X_T file on a server and have users download the file via a browser. Parasolid V34.0 and later are impacted. It is recommended to apply vendor fixes. Parasolid V33.1

How to check if you are vulnerable?

The safest way to check if you are vulnerable to this vulnerability is to look for the CVE-2022-39150 in your product.

Timeline

Published on: 09/13/2022 10:15:00 UTC
Last modified on: 09/13/2022 15:12:00 UTC

References