UEF in Siemens JT2Go/Teamcenter Vis. (<V14.2.0.5) via ASM parse RCE
CVE-2023-28830 Published on August 8, 2023
A vulnerability has been identified in JT2Go (All versions < V14.2.0.5), Solid Edge SE2022 (All versions < V222.0 Update 13), Solid Edge SE2023 (All versions < V223.0 Update 4), Teamcenter Visualization V13.2 (All versions < V13.2.0.15), Teamcenter Visualization V13.3 (All versions < V13.3.0.11), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.5). The affected application contains a use-after-free vulnerability that could be triggered while parsing specially crafted ASM file. An attacker could leverage this vulnerability to execute code in the context of the current process.
Weakness Type
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2023-28830 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2023-28830
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-28830 are published in these products:
Affected Versions
Siemens JT2Go:- Version All versions < V14.2.0.5 is affected.
- Version All versions < V222.0 Update 13 is affected.
- Version All versions < V223.0 Update 4 is affected.
- Version All versions < V13.2.0.15 is affected.
- Version All versions < V13.3.0.11 is affected.
- Version All versions < V14.1.0.11 is affected.
- Version All versions < V14.2.0.5 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.