First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15058, ZDI-CAN-19076, ZDI-CAN-19077)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Jt Open Toolkit | <11.1.1.0 | |
Siemens Jt Utilities | <13.1.1.0 | |
Siemens JT2Go | <13.2.0.5 | |
Siemens Solid Edge | <se2023 | |
Siemens Teamcenter Visualization | <13.2.0.5 | |
Siemens JT2Go | <13.2.0.5 | 13.2.0.5 |
Siemens Teamcenter Visualization | <13.2.0.5 | 13.2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44002 is high with a severity value of 7.8.
JT Open versions prior to V11.1.1.0, JT Utilities versions prior to V13.1.1.0, Solid Edge versions prior to V2023 are affected by CVE-2021-44002.
CVE-2021-44002 is an out-of-bounds write vulnerability in the Jt1001.dll file, which occurs while parsing specially crafted JT files.
Update JT Open to version V11.1.1.0 or higher, JT Utilities to version V13.1.1.0 or higher, and Solid Edge to version V2023 or higher to mitigate CVE-2021-44002.
Yes, you can refer to the following links for more information: [link1](https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf) and [link2](https://cert-portal.siemens.com/productcert/pdf/ssa-936212.pd).