First published: Tue Oct 11 2022(Updated: )
A vulnerability has been identified in JTTK (All versions < V11.1.1.0), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-16973)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Jt Open Toolkit | <11.1.1.0 | |
Siemens Simcenter Femap | >=2022.1.0<2022.1.3 | |
Siemens Simcenter Femap | >=2022.2.0<2022.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-41851.
The severity of CVE-2022-41851 is high with a CVSS score of 7.8.
All versions of JTTK < V11.1.1.0, Simcenter Femap V2022.1 < V2022.1.3, and Simcenter Femap V2022.2 < V2022.2.2 are affected by CVE-2022-41851.
The CWE ID for this vulnerability is CWE-824.
To fix CVE-2022-41851, it is recommended to upgrade JTTK to version 11.1.1.0 or later, Simcenter Femap V2022.1 to version 2022.1.3 or later, and Simcenter Femap V2022.2 to version 2022.2.2 or later.