Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:siemens:jt_open_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E5FA782-E074-4406-ACA6-788DD24327C7", "versionEndExcluding": "11.1.1.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CC6B707-5527-4A4F-BA46-C2EE6CCF8E56", "versionEndExcluding": "2022.1.3", "versionStartIncluding": "2022.1.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*", "matchCriteriaId": "98BF38F3-E62A-4913-A300-EF7F3001BC64", "versionEndExcluding": "2022.2.2", "versionStartIncluding": "2022.2.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability has been identified in JTTK (All versions < V11.1.1.0), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-16973)"}, {"lang": "es", "value": "Se ha identificado una vulnerabilidad en JTTK (Todas las versiones anteriores a V11.1.1.0), Simcenter Femap V2022.1 (Todas las versiones anteriores a V2022.1.3), Simcenter Femap V2022.2 (Todas las versiones anteriores a V2022.2.2). La biblioteca JTTK es susceptible a una vulnerabilidad de referencia de puntero no inicializada mientras analiza archivos JT especialmente dise\u00f1ados. Un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. (ZDI-CAN-16973)"}], "id": "CVE-2022-41851", "lastModified": "2024-11-21T07:23:56.527", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-10-11T11:15:11.120", "references": [{"source": "productcert@siemens.com", "tags": ["Patch", "Vendor Advisory"], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-611756.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-611756.pdf"}], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-824"}], "source": "productcert@siemens.com", "type": "Secondary"}]}