CVE-2021-44447 vulnerability in Siemens Products
Published on December 14, 2021
A vulnerability has been identified in JT Utilities (All versions < V13.0.3.0), JTTK (All versions < V11.0.3.0). JTTK library in affected products contains a use-after-free vulnerability that could be triggered while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14911)
Weakness Type
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2021-44447 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2021-44447
stack.watch emails you whenever new vulnerabilities are published in Siemens Jt Open Toolkit or Siemens Jt Utilities. Just hit a watch button to start following.
Affected Versions
Siemens JT Utilities:- Version All versions < V13.0.3.0 is affected.
- Version All versions < V11.0.3.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.