First published: Tue Nov 08 2022(Updated: )
A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.7), Teamcenter Visualization V13.3 (All versions >= V13.3.0.7 < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.3), Teamcenter Visualization V14.1 (All versions < V14.1.0.4). The affected application is vulnerable to fixed-length heap-based buffer while parsing specially crafted TIF files. An attacker could leverage this vulnerability to execute code in the context of the current process.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <14.1.0.4 | |
Siemens Teamcenter Visualization | <=13.3.0.7 | |
Siemens Teamcenter Visualization | >=14.0<14.0.0.3 | |
Siemens Teamcenter Visualization | >=14.1<14.1.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-39136 is high with a CVSS score of 7.8.
JT2Go versions before V14.1.0.4, Teamcenter Visualization versions before V13.2.0.12, V13.3.0.7, V13.3.0.8, and V14.0.0.3 are affected by CVE-2022-39136.
Update JT2Go to version V14.1.0.4 or higher, and update Teamcenter Visualization to version V13.2.0.12, V13.3.0.7, V13.3.0.8, or V14.0.0.3.
You can find more information about CVE-2022-39136 at the following reference link: [https://cert-portal.siemens.com/productcert/pdf/ssa-120378.pdf](https://cert-portal.siemens.com/productcert/pdf/ssa-120378.pdf).
The CWE identifiers for CVE-2022-39136 are CWE-787 and CWE-122.