First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT Utilities (All versions < V12.8.1.1), JTTK (All versions < V10.8.1.1). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-15055, ZDI-CAN-14915, ZDI-CAN-14865)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Jt Open Toolkit | <10.8.8.1 | |
Siemens Jt Utilities | <12.8.8.1 | |
<10.8.8.1 | ||
<12.8.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44450 is high.
Siemens JT Utilities versions prior to V12.8.1.1 and Siemens JTTK versions prior to V10.8.1.1 are affected by CVE-2021-44450.
The vulnerability in Siemens JT Utilities and JTTK is an out-of-bounds read past the end of an allocated buffer when parsing JT files, which could lead to information leakage.
An attacker can exploit CVE-2021-44450 by leveraging the vulnerability to leak information.
Yes, updating Siemens JT Utilities to V12.8.1.1 and Siemens JTTK to V10.8.1.1 will fix CVE-2021-44450.