First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to memory corruption condition while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14912)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Jt Open Toolkit | <11.1.1.0 | |
Siemens Jt Utilities | <13.1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44440 is a vulnerability in JT Utilities and JTTK that allows an attacker to execute code by parsing specially crafted JT files.
CVE-2021-44440 affects all versions of JT Utilities before V13.1.1.0 and all versions of JTTK before V11.1.1.0.
CVE-2021-44440 has a severity score of 7.8, which is considered high.
An attacker can exploit CVE-2021-44440 by leveraging the memory corruption condition while parsing specially crafted JT files.
Yes, upgrading to JT Utilities V13.1.1.0 or later, and JTTK V11.1.1.0 or later, will fix the vulnerability.