CVE-2023-38072: OOB write in JT2Go/Teamcenter Viz <V14.3, Tecnomatix PS<V2302 via WRL
CVE-2023-38072 Published on September 12, 2023

A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20825)

NVD

Weakness Type

What is a Memory Corruption Vulnerability?

The software writes data past the end, or before the beginning, of the intended buffer. Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.

CVE-2023-38072 has been classified to as a Memory Corruption vulnerability or weakness.


Products Associated with CVE-2023-38072

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-38072 are published in these products:

 
 
 

Affected Versions

Siemens JT2Go: Siemens Teamcenter Visualization V13.3: Siemens Teamcenter Visualization V14.0: Siemens Teamcenter Visualization V14.1: Siemens Teamcenter Visualization V14.2: Siemens Teamcenter Visualization V14.3: Siemens Tecnomatix Plant Simulation V2201: Siemens Tecnomatix Plant Simulation V2302:

Exploit Probability

EPSS
0.04%
Percentile
12.36%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.