CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
20.6%
A vulnerability has been identified in JT2Go (All versions < V14.2.0.5), Solid Edge SE2022 (All versions < V222.0 Update 13), Solid Edge SE2023 (All versions < V223.0 Update 4), Teamcenter Visualization V13.2 (All versions < V13.2.0.15), Teamcenter Visualization V13.3 (All versions < V13.3.0.11), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.5). The affected application contains a use-after-free vulnerability that could be triggered while parsing specially crafted ASM file. An attacker could leverage this vulnerability to execute code in the context of the current process.
Vendor | Product | Version | CPE |
---|---|---|---|
siemens | jt2go | * | cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:* |
siemens | teamcenter_visualization | * | cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:* |
siemens | solid_edge_se2022 | - | cpe:2.3:a:siemens:solid_edge_se2022:-:*:*:*:*:*:*:* |
siemens | solid_edge_se2022 | maintenance_pack_1 | cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_1:*:*:*:*:*:*:* |
siemens | solid_edge_se2022 | maintenance_pack_2 | cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_2:*:*:*:*:*:*:* |
siemens | solid_edge_se2022 | maintenance_pack_3 | cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_3:*:*:*:*:*:*:* |
siemens | solid_edge_se2022 | maintenance_pack_4 | cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_4:*:*:*:*:*:*:* |
siemens | solid_edge_se2022 | maintenance_pack_5 | cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_5:*:*:*:*:*:*:* |
siemens | solid_edge_se2022 | maintenance_pack_7 | cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_7:*:*:*:*:*:*:* |
siemens | solid_edge_se2022 | maintenance_pack_8 | cpe:2.3:a:siemens:solid_edge_se2022:maintenance_pack_8:*:*:*:*:*:*:* |