First published: Tue Dec 13 2022(Updated: )
A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains stack exhaustion vulnerability when parsing a CGM file. An attacker could leverage this vulnerability to crash the application causing denial of service condition.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | ||
Siemens Teamcenter Visualization | >=13.2.0<13.2.0.12 | |
Siemens Teamcenter Visualization | >=13.3.0<13.3.0.8 | |
Siemens Teamcenter Visualization | >=14.0<14.0.0.4 | |
Siemens Teamcenter Visualization | >=14.1<14.1.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41288 is a vulnerability identified in JT2Go and Teamcenter Visualization software versions prior to specific versions, which allows remote attackers to execute arbitrary code.
JT2Go versions prior to V14.1.0.6, Teamcenter Visualization V13.2 versions prior to V13.2.0.12, Teamcenter Visualization V13.3 versions prior to V13.3.0.8, Teamcenter Visualization V14.0 versions prior to V14.0.0.4, and Teamcenter Visualization V14.1 versions prior to V14.1.0.6 are affected.
CVE-2022-41288 has a severity of medium (CVSS score 3.3).
An attacker can exploit CVE-2022-41288 by sending a specially crafted file to the targeted user, which could lead to remote code execution.
To fix CVE-2022-41288, Siemens recommends updating to the specified versions for JT2Go and Teamcenter Visualization software.