Null Pointer DoS in Siemens JT2Go <14.2.0.3 & Teamcenter Vis <14.2.0.3
CVE-2023-33121 Published on June 13, 2023
A vulnerability has been identified in JT2Go (All versions < V14.2.0.3), Teamcenter Visualization V13.2 (All versions < V13.2.0.13), Teamcenter Visualization V13.3 (All versions < V13.3.0.10), Teamcenter Visualization V14.0 (All versions < V14.0.0.6), Teamcenter Visualization V14.1 (All versions < V14.1.0.8), Teamcenter Visualization V14.2 (All versions < V14.2.0.3). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.
Weakness Type
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
Products Associated with CVE-2023-33121
stack.watch emails you whenever new vulnerabilities are published in Siemens Teamcenter Visualization or Siemens Jt2go. Just hit a watch button to start following.
Affected Versions
Siemens JT2Go:- Version All versions < V14.2.0.3 is affected.
- Version All versions < V13.2.0.13 is affected.
- Version All versions < V13.3.0.10 is affected.
- Version All versions < V14.0.0.6 is affected.
- Version All versions < V14.1.0.8 is affected.
- Version All versions < V14.2.0.3 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.