First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visualization (All versions < V13.2.0.5). The VCRUNTIME140.dll is vulnerable to an out of bounds read past the end of an allocated buffer when parsing specially crafted CGM files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-15109)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.2.0.5 | |
Siemens Teamcenter Visualization | <13.2.0.5 | |
Siemens JT2Go | ||
Siemens JT2Go | <13.2.0.5 | 13.2.0.5 |
Siemens Teamcenter Visualization | <13.2.0.5 | 13.2.0.5 |
<13.2.0.5 | ||
<13.2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Siemens JT2Go vulnerability is CVE-2021-44015.
The title of this vulnerability is "Siemens JT2Go CGM File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability".
The severity of CVE-2021-44015 is medium with a severity value of 5.5.
CVE-2021-44015 allows remote attackers to disclose sensitive information on affected installations of Siemens JT2Go through user interaction, such as visiting a malicious page or opening a malicious file.
Yes, user interaction is required to exploit the vulnerability CVE-2021-44015.
The Siemens products affected by the vulnerability CVE-2021-44015 are JT2Go and Siemens Teamcenter Visualization.
The Common Weakness Enumeration (CWE) ID associated with CVE-2021-44015 is CWE-125.
To fix the vulnerability CVE-2021-44015, it is recommended to update to a version higher than 13.2.0.5 of Siemens JT2Go or Siemens Teamcenter Visualization.