CVE-2022-45484
Siemens JT2Go RAS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.9), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.5), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CCITT_G4Decode.dll contains an out of bounds read vulnerability when parsing a RAS file. An attacker can leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19056)
Se ha identificado una vulnerabilidad en:
JT2Go (Todas las versiones < V14.1.0.6),
Teamcenter Visualization V13.2 (Todas las versiones < V13.2.0.12),
Teamcenter Visualization V13.3 (Todas las versiones < V13.3.0. 9),
Teamcenter Visualization V13.3 (todas las versiones < V13.3.0.8),
Teamcenter Visualization V14.0 (todas las versiones < V14.0.0.5),
Teamcenter Visualization V14.0 (todas las versiones < V14.0.0 .4),
Teamcenter Visualization V14.1 (todas las versiones < V14.1.0.6).
CCITT_G4Decode.dll contiene una vulnerabilidad de lectura fuera de los límites al analizar un archivo RAS. Un atacante puede aprovechar esta vulnerabilidad para ejecutar código en el contexto del proceso actual. (ZDI-CAN-19056)
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of RAS files. Crafted data in an RAS file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-11-21 CVE Reserved
- 2022-12-13 CVE Published
- 2024-05-25 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-700053.pdf | 2023-04-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Jt2go Search vendor "Siemens" for product "Jt2go" | * | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Teamcenter Visualization Search vendor "Siemens" for product "Teamcenter Visualization" | >= 13.2.0 < 13.2.0.12 Search vendor "Siemens" for product "Teamcenter Visualization" and version " >= 13.2.0 < 13.2.0.12" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Teamcenter Visualization Search vendor "Siemens" for product "Teamcenter Visualization" | >= 13.3.0 < 13.3.0.8 Search vendor "Siemens" for product "Teamcenter Visualization" and version " >= 13.3.0 < 13.3.0.8" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Teamcenter Visualization Search vendor "Siemens" for product "Teamcenter Visualization" | >= 14.0 < 14.0.0.4 Search vendor "Siemens" for product "Teamcenter Visualization" and version " >= 14.0 < 14.0.0.4" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Teamcenter Visualization Search vendor "Siemens" for product "Teamcenter Visualization" | >= 14.1 < 14.1.0.6 Search vendor "Siemens" for product "Teamcenter Visualization" and version " >= 14.1 < 14.1.0.6" | - |
Affected
|