JT2Go/Teamcenter Vis CGM_NIST_Loader.dll UAF before 14.1.0.6
CVE-2022-41285 Published on December 13, 2022
A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains a use-after-free vulnerability that could be triggered while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process.
Weakness Type
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2022-41285 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2022-41285
stack.watch emails you whenever new vulnerabilities are published in Siemens Teamcenter Visualization or Siemens Jt2go. Just hit a watch button to start following.
Affected Versions
Siemens JT2Go:- Version All versions < V14.1.0.6 is affected.
- Version All versions < V13.2.0.12 is affected.
- Version All versions < V13.3.0.8 is affected.
- Version All versions < V14.0.0.4 is affected.
- Version All versions < V14.1.0.6 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.