Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Siemens
Siemens solid Edge Se2026 |
|
| Vendors & Products |
Siemens
Siemens solid Edge Se2026 |
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Uninitialized Pointer Access in Solid Edge SE2026 Allows Local Code Execution |
Tue, 12 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. | |
| Weaknesses | CWE-824 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2026-05-12T12:39:00.293Z
Reserved: 2026-05-06T09:51:05.262Z
Link: CVE-2026-44411
Updated: 2026-05-12T12:38:50.096Z
Status : Awaiting Analysis
Published: 2026-05-12T10:16:46.430
Modified: 2026-05-12T14:19:41.400
Link: CVE-2026-44411
No data.
OpenCVE Enrichment
Updated: 2026-05-12T11:15:14Z