ID

VAR-202205-0718


CVE

CVE-2022-24290


TITLE

Siemens Teamcenter Buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202205-2996

DESCRIPTION

A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.13), Teamcenter V13.0 (All versions < V13.0.0.9), Teamcenter V13.1 (All versions), Teamcenter V13.2 (All versions < V13.2.0.8), Teamcenter V13.3 (All versions < V13.3.0.3), Teamcenter V14.0 (All versions < V14.0.0.2). The tcserver.exe binary in affected applications is vulnerable to a stack overflow condition during the parsing of user input that may lead the binary to crash. Siemens Teamcenter

Trust: 0.99

sources: NVD: CVE-2022-24290 // VULMON: CVE-2022-24290

AFFECTED PRODUCTS

vendor:siemensmodel:teamcenter visualizationscope:ltversion:13.2.0.8

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:lteversion:13.1.0.3

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:gteversion:12.4.0

Trust: 1.0

vendor:siemensmodel:teamcenterscope:eqversion:14.0

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:ltversion:12.4.0.13

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:ltversion:13.0.0.9

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:gteversion:13.2.0

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:gteversion:13.3.0

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:gteversion:13.0.0

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:ltversion:13.3.0.3

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:gteversion:13.1.0

Trust: 1.0

sources: NVD: CVE-2022-24290

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2022-24290
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202205-2996
value: HIGH

Trust: 0.6

NVD: CVE-2022-24290
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2022-24290
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: CNNVD: CNNVD-202205-2996 // NVD: CVE-2022-24290

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

sources: NVD: CVE-2022-24290

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202205-2996

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202205-2996

CONFIGURATIONS

sources: NVD: CVE-2022-24290

PATCH

title:Siemens Teamcenter Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=194232

Trust: 0.6

sources: CNNVD: CNNVD-202205-2996

EXTERNAL IDS

db:NVDid:CVE-2022-24290

Trust: 1.7

db:SIEMENSid:SSA-789162

Trust: 1.6

db:ICS CERTid:ICSA-22-132-16

Trust: 0.7

db:CS-HELPid:SB2022051123

Trust: 0.6

db:CNNVDid:CNNVD-202205-2996

Trust: 0.6

db:VULMONid:CVE-2022-24290

Trust: 0.1

sources: VULMON: CVE-2022-24290 // CNNVD: CNNVD-202205-2996 // NVD: CVE-2022-24290

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-789162.pdf

Trust: 1.6

url:https://cxsecurity.com/cveshow/cve-2022-24290/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-132-16

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022051123

Trust: 0.6

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-16

Trust: 0.1

sources: VULMON: CVE-2022-24290 // CNNVD: CNNVD-202205-2996 // NVD: CVE-2022-24290

CREDITS

Han Lee from Apple Information Security reported these vulnerabilities to Siemens.

Trust: 0.6

sources: CNNVD: CNNVD-202205-2996

SOURCES

db:VULMONid:CVE-2022-24290
db:CNNVDid:CNNVD-202205-2996
db:NVDid:CVE-2022-24290

LAST UPDATE DATE

2022-08-11T22:15:15.753000+00:00


SOURCES UPDATE DATE

db:CNNVDid:CNNVD-202205-2996date:2022-08-11T00:00:00
db:NVDid:CVE-2022-24290date:2022-08-10T12:15:00

SOURCES RELEASE DATE

db:CNNVDid:CNNVD-202205-2996date:2022-05-11T00:00:00
db:NVDid:CVE-2022-24290date:2022-05-20T13:15:00