First published: Tue Dec 13 2022(Updated: )
A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains an out of bounds write vulnerability when parsing a CGM file. An attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | ||
Siemens Teamcenter Visualization | >=13.2.0<13.2.0.12 | |
Siemens Teamcenter Visualization | >=13.3.0<13.3.0.8 | |
Siemens Teamcenter Visualization | >=14.0<14.0.0.4 | |
Siemens Teamcenter Visualization | >=14.1<14.1.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability severity of CVE-2022-41286 is high, with a severity value of 7.8.
JT2Go versions < V14.1.0.6 and Teamcenter Visualization versions < V13.2.0.12, < V13.3.0.8, < V14.0.0.4, and < V14.1.0.6 are affected by CVE-2022-41286.
The common weakness enumeration (CWE) associated with CVE-2022-41286 are CWE-125 (Out-of-bounds Read) and CWE-787 (Out-of-bounds Write).
Siemens has released security updates to address the vulnerability. Refer to the Siemens security advisory for detailed information.
You can find more information about CVE-2022-41286 in the Siemens security advisory available at the following link: https://cert-portal.siemens.com/productcert/pdf/ssa-700053.pdf