First published: Thu Oct 20 2022(Updated: )
The APDFL.dll in Siemens JT2Go prior to V13.3.0.5 and Siemens Teamcenter Visualization prior to V14.0.0.2 contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.3.0.5 | |
Siemens Teamcenter Visualization | >=13.3.0<13.3.0.5 | |
Siemens Teamcenter Visualization | >=14.0<14.0.0.2 | |
Siemens Teamcenter Visualization V13.3 | <13.3.0.5 | 13.3.0.5 |
Siemens recommends updating to the latest version: Teamcenter Visualization V13.3: Update to version 13.3.0.5 or later Teamcenter Visualization V14.0: Currently no fix available. JT2Go V13.3.0.5: Update to version 13.3.0.5 or later For more information see Siemens Security Advisory SSA-829738
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-2069.
The severity of CVE-2022-2069 is high with a score of 7.8.
Siemens JT2Go prior to V13.3.0.5 and Siemens Teamcenter Visualization prior to V14.0.0.2 are affected by CVE-2022-2069.
An attacker can exploit CVE-2022-2069 by parsing specially crafted PDF files, which can lead to an out of bounds write past the fixed-length heap-based buffer and allow the execution of code in the current process context.
Yes, you can find more information about CVE-2022-2069 at the following references: [1](https://cert-portal.siemens.com/productcert/pdf/ssa-829738.pdf) and [2](https://www.cisa.gov/uscert/ics/advisories/icsa-22-195-07).