Overview
- Description
- A vulnerability has been identified in JTTK (All versions < V11.1.1.0), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-16973)
- Source
- productcert@siemens.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- productcert@siemens.com
- CWE-824
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:jt_open_toolkit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E5FA782-E074-4406-ACA6-788DD24327C7", "versionEndExcluding": "11.1.1.0" }, { "criteria": "cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CC6B707-5527-4A4F-BA46-C2EE6CCF8E56", "versionEndExcluding": "2022.1.3", "versionStartIncluding": "2022.1.0" }, { "criteria": "cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98BF38F3-E62A-4913-A300-EF7F3001BC64", "versionEndExcluding": "2022.2.2", "versionStartIncluding": "2022.2.0" } ], "operator": "OR" } ] } ]