First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT Utilities (All versions < V13.0.3.0), JTTK (All versions < V11.0.3.0). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14828, ZDI-CAN-14898)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Jt Open Toolkit | <11.0.3.0 | |
Siemens Jt Utilities | <13.0.3.0 | |
<11.0.3.0 | ||
<13.0.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44446 is high with a CVSS score of 7.8.
JT Utilities versions prior to V13.0.3.0 and JTTK versions prior to V11.0.3.0 are affected by CVE-2021-44446.
The vulnerability in Siemens JT Utilities and JTTK is an out-of-bounds write past the end of an allocated structure while parsing specially crafted JT files.
By exploiting CVE-2021-44446, an attacker can execute arbitrary code on the affected system.
Yes, updating to JT Utilities V13.0.3.0 or later and JTTK V11.0.3.0 or later will fix the vulnerability.