First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visualization (All versions < V13.2.0.5). The Jt1001.dll is vulnerable to an out of bounds read past the end of an allocated buffer while parsing specially crafted JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-15101)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.2.0.5 | |
Siemens Teamcenter Visualization | <13.2.0.5 | |
Siemens JT2Go | ||
Siemens JT2Go | <13.2.0.5 | 13.2.0.5 |
Siemens Teamcenter Visualization | <13.2.0.5 | 13.2.0.5 |
<13.2.0.5 | ||
<13.2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Siemens JT2Go vulnerability is CVE-2021-44011.
The title of this Siemens JT2Go vulnerability is Siemens JT2Go JT File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability.
The severity of CVE-2021-44011 is medium with a severity value of 5.5.
Remote attackers can exploit CVE-2021-44011 by tricking the target into visiting a malicious page or opening a malicious file.
Siemens JT2Go versions up to and excluding 13.2.0.5 and Siemens Teamcenter Visualization versions up to and excluding 13.2.0.5 are affected by CVE-2021-44011.
Yes, user interaction is required to exploit CVE-2021-44011.
Yes, there are official documents and references available for CVE-2021-44011. You can find them at the following links: [link1](https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf), [link2](https://www.zerodayinitiative.com/advisories/ZDI-22-007/), [link3](https://www.cisa.gov/uscert/ics/advisories/icsa-21-350-10).
The Common Weakness Enumeration (CWE) ID associated with CVE-2021-44011 is CWE-125.