CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS4
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
PASSIVE
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.
[
{
"cpes": [
"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*"
],
"vendor": "siemens",
"product": "jt2go",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "2312.0004",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*"
],
"vendor": "siemens",
"product": "parasolid",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "35.1.254",
"versionType": "custom"
},
{
"status": "affected",
"version": "0",
"lessThan": "36.0.207",
"versionType": "custom"
},
{
"status": "affected",
"version": "0",
"lessThan": "36.1.147",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:a:siemens:teamcenter_visualization:14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:2312:*:*:*:*:*:*:*"
],
"vendor": "siemens",
"product": "teamcenter_visualization",
"versions": [
{
"status": "affected",
"version": "14.2",
"lessThan": "*",
"versionType": "custom"
},
{
"status": "affected",
"version": "14.3",
"lessThan": "14.3.0.9",
"versionType": "custom"
},
{
"status": "affected",
"version": "2312",
"lessThan": "2312.0004",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS4
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
PASSIVE
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N
SSVC
Exploitation
none
Automatable
no
Technical Impact
total