Parasolid & Simcenter Femap X_T Pointer Access Vulnerability CVE-2022-39147
CVE-2022-39147 Published on September 13, 2022

A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.262), Parasolid V33.1 (All versions >= V33.1.262 < V33.1.263), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.161), Parasolid V35.0 (All versions >= V35.0.161 < V35.0.164), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted X_T files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-17506)

NVD

Weakness Type

Access of Uninitialized Pointer

The program accesses or uses a pointer that has not been initialized.


Products Associated with CVE-2022-39147

stack.watch emails you whenever new vulnerabilities are published in Siemens Simcenter Femap or Siemens Parasolid. Just hit a watch button to start following.

 
 

Affected Versions

Siemens Parasolid V33.1: Siemens Parasolid V33.1: Siemens Parasolid V34.0: Siemens Parasolid V34.1: Siemens Parasolid V35.0: Siemens Parasolid V35.0: Siemens Simcenter Femap V2022.1: Siemens Simcenter Femap V2022.2:

Exploit Probability

EPSS
0.06%
Percentile
19.38%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.