A vulnerability has been identified in JTTK (All versions < V11.1.1.0), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-16973)
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-611756.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-611756.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-611756.pdf - Patch, Vendor Advisory |
Information
Published : 2022-10-11 11:15
Updated : 2024-11-21 07:23
NVD link : CVE-2022-41851
Mitre link : CVE-2022-41851
CVE.ORG link : CVE-2022-41851
JSON object : View
Products Affected
siemens
- jt_open_toolkit
- simcenter_femap
CWE
CWE-824
Access of Uninitialized Pointer