siemens teamcenter-visualization CVE-2022-29032 vulnerability in Siemens Products
Published on May 20, 2022

A vulnerability has been identified in JT2Go (All versions < V13.3.0.3), Teamcenter Visualization V13.3 (All versions < V13.3.0.3), Teamcenter Visualization V14.0 (All versions < V14.0.0.1). The CGM_NIST_Loader.dll library contains a double free vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process.

NVD

Weakness Type

What is a Double-free Vulnerability?

The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations. When a program calls free() twice with the same argument, the program's memory management data structures become corrupted. This corruption can cause the program to crash or, in some circumstances, cause two later calls to malloc() to return the same pointer. If malloc() returns the same value twice and the program later gives the attacker control over the data that is written into this doubly-allocated memory, the program becomes vulnerable to a buffer overflow attack.

CVE-2022-29032 has been classified to as a Double-free vulnerability or weakness.


Products Associated with CVE-2022-29032

stack.watch emails you whenever new vulnerabilities are published in Siemens Teamcenter Visualization or Siemens Jt2go. Just hit a watch button to start following.

 
 

Affected Versions

Siemens JT2Go: Siemens Teamcenter Visualization V13.3: Siemens Teamcenter Visualization V14.0:

Exploit Probability

EPSS
0.54%
Percentile
67.37%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.