Use-After-Free in Siemens JT2Go / Teamcenter Vis < V14.1.0.4 CGM Parsing
CVE-2022-41663 Published on November 8, 2022

A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.7), Teamcenter Visualization V14.0 (All versions < V14.0.0.3), Teamcenter Visualization V14.1 (All versions < V14.1.0.4). The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process.

NVD

Weakness Type

What is a Dangling pointer Vulnerability?

Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE-2022-41663 has been classified to as a Dangling pointer vulnerability or weakness.


Products Associated with CVE-2022-41663

stack.watch emails you whenever new vulnerabilities are published in Siemens Jt2go or Siemens Teamcenter Visualization. Just hit a watch button to start following.

 
 

Affected Versions

Siemens JT2Go: Siemens Teamcenter Visualization V13.2: Siemens Teamcenter Visualization V13.3: Siemens Teamcenter Visualization V14.0: Siemens Teamcenter Visualization V14.1:

Exploit Probability

EPSS
0.11%
Percentile
29.52%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.