DoS via Null Pointer in Siemens JT2Go/Parasolid/Teamcenter before V2312.0004
CVE-2024-26277 Published on April 9, 2024

A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted X_T files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.

NVD

Weakness Type

NULL Pointer Dereference

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.


Products Associated with CVE-2024-26277

Want to know whenever a new CVE is published for Siemens Jt2go? stack.watch will email you.

 

Affected Versions

Siemens JT2Go: Siemens Parasolid V35.1: Siemens Parasolid V36.0: Siemens Parasolid V36.1: Siemens Teamcenter Visualization V14.2: Siemens Teamcenter Visualization V14.3: Siemens Teamcenter Visualization V2312:

Exploit Probability

EPSS
0.06%
Percentile
17.03%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.