ID

VAR-202212-1162


CVE

CVE-2022-41285


TITLE

Siemens'  JT2Go  and  Teamcenter Visualization  Vulnerability in using free memory in

Trust: 0.8

sources: JVNDB: JVNDB-2022-023185

DESCRIPTION

A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains a use-after-free vulnerability that could be triggered while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process. Siemens' JT2Go and Teamcenter Visualization Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2022-41285 // JVNDB: JVNDB-2022-023185

AFFECTED PRODUCTS

vendor:siemensmodel:teamcenter visualizationscope:ltversion:13.2.0.12

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:ltversion:14.1.0.6

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:gteversion:13.2.0

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:ltversion:13.3.0.8

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:gteversion:14.1

Trust: 1.0

vendor:siemensmodel:jt2goscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:gteversion:14.0

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:gteversion:13.3.0

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:ltversion:14.0.0.4

Trust: 1.0

vendor:シーメンスmodel:teamcenter visualizationscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:jt2goscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-023185 // NVD: CVE-2022-41285

CVSS

SEVERITY

CVSSV2

CVSSV3

productcert@siemens.com: CVE-2022-41285
value: HIGH

Trust: 1.0

NVD: CVE-2022-41285
value: HIGH

Trust: 1.0

OTHER: JVNDB-2022-023185
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202212-3107
value: HIGH

Trust: 0.6

productcert@siemens.com:
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

OTHER: JVNDB-2022-023185
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-023185 // NVD: CVE-2022-41285 // NVD: CVE-2022-41285 // CNNVD: CNNVD-202212-3107

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.0

problemtype:Use of freed memory (CWE-416) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-023185 // NVD: CVE-2022-41285

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202212-3107

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202212-3107

CONFIGURATIONS

sources: NVD: CVE-2022-41285

PATCH

title:Siemens part of the product Remediation of resource management error vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqbyid.tag?id=217845

Trust: 0.6

sources: CNNVD: CNNVD-202212-3107

EXTERNAL IDS

db:NVDid:CVE-2022-41285

Trust: 3.2

db:SIEMENSid:SSA-700053

Trust: 2.4

db:ICS CERTid:ICSA-22-349-20

Trust: 0.8

db:JVNid:JVNVU91561630

Trust: 0.8

db:JVNDBid:JVNDB-2022-023185

Trust: 0.8

db:CNNVDid:CNNVD-202212-3107

Trust: 0.6

sources: JVNDB: JVNDB-2022-023185 // NVD: CVE-2022-41285 // CNNVD: CNNVD-202212-3107

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-700053.pdf

Trust: 2.4

url:https://jvn.jp/vu/jvnvu91561630/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-41285

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-20

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-41285/

Trust: 0.6

sources: JVNDB: JVNDB-2022-023185 // NVD: CVE-2022-41285 // CNNVD: CNNVD-202212-3107

SOURCES

db:JVNDBid:JVNDB-2022-023185
db:NVDid:CVE-2022-41285
db:CNNVDid:CNNVD-202212-3107

LAST UPDATE DATE

2023-12-18T10:52:04.354000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2022-023185date:2023-11-28T02:18:00
db:NVDid:CVE-2022-41285date:2023-04-11T10:15:17.090
db:CNNVDid:CNNVD-202212-3107date:2023-04-12T00:00:00

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2022-023185date:2023-11-28T00:00:00
db:NVDid:CVE-2022-41285date:2022-12-13T16:15:22.887
db:CNNVDid:CNNVD-202212-3107date:2022-12-13T00:00:00