{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T01:38:07.891","vulnerabilities":[{"cve":{"id":"CVE-2021-22651","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2021-02-23T18:15:13.553","lastModified":"2024-11-21T05:50:23.497","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When loading a specially crafted file, Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are, while processing the extraction of temporary files, suffering from a directory traversal vulnerability, which allows an attacker to store arbitrary scripts into automatic startup folders."},{"lang":"es","value":"Cuando se carga un archivo especialmente diseñado, Luxion KeyShot versiones anteriores a 10.1, Luxion KeyShot Viewer versiones anteriores a 10.1, Luxion KeyShot Network Rendering versiones anteriores a 10.1 y Luxion KeyVR versiones anteriores a 10.1, mientras se procesa la extracción de archivos temporales, sufre de una vulnerabilidad de salto de directorio, que permite a un atacante almacenar scripts arbitrarios en carpetas de inicio automático"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","matchCriteriaId":"92EA043D-B0BD-4C61-B6C6-709C001F0363"},{"vulnerable":true,"criteria":"cpe:2.3:a:luxion:keyshot_network_rendering:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","matchCriteriaId":"99429D18-218B-4B84-B1E7-7E4B54B6CDD3"},{"vulnerable":true,"criteria":"cpe:2.3:a:luxion:keyshot_viewer:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","matchCriteriaId":"50848054-203F-4C61-8A26-154083FC0C15"},{"vulnerable":true,"criteria":"cpe:2.3:a:luxion:keyvr:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","matchCriteriaId":"80310813-CE50-4876-85FF-18760DD5F502"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:solid_edge_se2020_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"7B8F6B67-0A8A-42E5-B9BD-3539475D7C92"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:solid_edge_se2020:-:*:*:*:*:*:*:*","matchCriteriaId":"E2BB7C3E-32DA-477C-8C11-E35546BC5D61"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:solid_edge_se2021_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"E83F677E-3133-407D-8089-E2682DBFDA1E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:solid_edge_se2021:-:*:*:*:*:*:*:*","matchCriteriaId":"1B9B3882-6975-42EA-A056-B6EC83E51E78"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory"]},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01","source":"ics-cert@hq.dhs.gov","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-324/","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-324/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}