siemens jt-open-toolkit CVE-2021-44433 vulnerability in Siemens Products
Published on December 14, 2021

A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products contains a use after free vulnerability that could be triggered while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14900)

NVD

Weakness Type

What is a Dangling pointer Vulnerability?

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE-2021-44433 has been classified to as a Dangling pointer vulnerability or weakness.


Products Associated with CVE-2021-44433

stack.watch emails you whenever new vulnerabilities are published in Siemens Jt Open Toolkit or Siemens Jt Utilities. Just hit a watch button to start following.

 
 

Affected Versions

Siemens JT Utilities: Siemens JTTK:

Exploit Probability

EPSS
0.68%
Percentile
71.30%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.