Lucene search

K
vulnrichmentSiemensVULNRICHMENT:CVE-2024-26275
HistoryApr 09, 2024 - 8:34 a.m.

CVE-2024-26275

2024-04-0908:34:36
CWE-125
siemens
github.com
2
vulnerability
jt2go
parasolid
teamcenter visualization
out of bounds read
x_t files
code execution

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS4

7.3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

PASSIVE

CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*"
    ],
    "vendor": "siemens",
    "product": "jt2go",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2312.0004",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*"
    ],
    "vendor": "siemens",
    "product": "parasolid",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "35.1.254",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "0",
        "lessThan": "36.0.207",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "0",
        "lessThan": "36.1.147",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:siemens:teamcenter_visualization:14.2:*:*:*:*:*:*:*",
      "cpe:2.3:a:siemens:teamcenter_visualization:14.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:siemens:teamcenter_visualization:2312:*:*:*:*:*:*:*"
    ],
    "vendor": "siemens",
    "product": "teamcenter_visualization",
    "versions": [
      {
        "status": "affected",
        "version": "14.2",
        "lessThan": "*",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "14.3",
        "lessThan": "14.3.0.9",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2312",
        "lessThan": "2312.0004",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS4

7.3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

PASSIVE

CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-26275