DoS via Null Pointer in Siemens JT2Go/Parasolid/Teamcenter before V2312.0004
CVE-2024-26277 Published on April 9, 2024
A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted X_T files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.
Weakness Type
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
Products Associated with CVE-2024-26277
Want to know whenever a new CVE is published for Siemens Jt2go? stack.watch will email you.
Affected Versions
Siemens JT2Go:- Before V2312.0004 is affected.
- Before V35.1.254 is affected.
- Before V36.0.207 is affected.
- Before V36.1.147 is affected.
- Before V14.2.0.12 is affected.
- Before V14.3.0.9 is affected.
- Before V2312.0004 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.