Search criteria
368 vulnerabilities found for Teamcenter Visualization by Siemens
VAR-202412-0349
Vulnerability from variot - Updated: 2025-10-04 22:00A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25206). Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files in the wrltojt module. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production throughput and improve manufacturing system performance
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202412-0349",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3.0.12"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.2.0.14"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0016"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0005"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0008"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.2"
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"model": "tecnomatix plant simulation",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2302\u003cv2302.0016"
},
{
"model": "tecnomatix plant simulation",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2404\u003cv2404.0005"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v14.2\u003cv14.2.0.14"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v14.3\u003cv14.3.0.12"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2312\u003cv2312.0008"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2406\u003cv2406.0005"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-25-058"
},
{
"db": "CNVD",
"id": "CNVD-2025-00880"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028346"
},
{
"db": "NVD",
"id": "CVE-2024-53242"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rocco Calvi (@TecR0c) with TecSecurity",
"sources": [
{
"db": "ZDI",
"id": "ZDI-25-058"
}
],
"trust": 0.7
},
"cve": "CVE-2024-53242",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 1.5,
"id": "CNVD-2025-00880",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "productcert@siemens.com",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2024-53242",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2024-028346",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2024-53242",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "productcert@siemens.com",
"id": "CVE-2024-53242",
"trust": 1.0,
"value": "High"
},
{
"author": "OTHER",
"id": "JVNDB-2024-028346",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2024-53242",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2025-00880",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-25-058"
},
{
"db": "CNVD",
"id": "CNVD-2025-00880"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028346"
},
{
"db": "NVD",
"id": "CVE-2024-53242"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions \u003c V14.2.0.14), Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.12), Teamcenter Visualization V2312 (All versions \u003c V2312.0008), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0016), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. \r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25206). Siemens\u0027 Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files in the wrltojt module. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production throughput and improve manufacturing system performance",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-53242"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028346"
},
{
"db": "ZDI",
"id": "ZDI-25-058"
},
{
"db": "CNVD",
"id": "CNVD-2025-00880"
}
],
"trust": 2.79
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-53242",
"trust": 3.9
},
{
"db": "SIEMENS",
"id": "SSA-583523",
"trust": 2.4
},
{
"db": "SIEMENS",
"id": "SSA-645131",
"trust": 1.8
},
{
"db": "JVN",
"id": "JVNVU91750786",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-24-347-09",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028346",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-25206",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-25-058",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2025-00880",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-25-058"
},
{
"db": "CNVD",
"id": "CNVD-2025-00880"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028346"
},
{
"db": "NVD",
"id": "CVE-2024-53242"
}
]
},
"id": "VAR-202412-0349",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-00880"
}
],
"trust": 0.8745396
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-00880"
}
]
},
"last_update_date": "2025-10-04T22:00:02.482000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-583523.html"
},
{
"title": "Patch for Siemens Teamcenter Visualization and Siemens Tecnomatix Plant Simulation Out-of-Bounds Read Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/650126"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-25-058"
},
{
"db": "CNVD",
"id": "CNVD-2025-00880"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-125",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds read (CWE-125) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-028346"
},
{
"db": "NVD",
"id": "CVE-2024-53242"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-583523.html"
},
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-645131.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91750786/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-53242"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-09"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-25-058"
},
{
"db": "CNVD",
"id": "CNVD-2025-00880"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028346"
},
{
"db": "NVD",
"id": "CVE-2024-53242"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-25-058"
},
{
"db": "CNVD",
"id": "CNVD-2025-00880"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028346"
},
{
"db": "NVD",
"id": "CVE-2024-53242"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-01-22T00:00:00",
"db": "ZDI",
"id": "ZDI-25-058"
},
{
"date": "2025-01-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-00880"
},
{
"date": "2025-10-03T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-028346"
},
{
"date": "2024-12-10T14:30:46.700000",
"db": "NVD",
"id": "CVE-2024-53242"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-01-22T00:00:00",
"db": "ZDI",
"id": "ZDI-25-058"
},
{
"date": "2025-01-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-00880"
},
{
"date": "2025-10-03T04:48:00",
"db": "JVNDB",
"id": "JVNDB-2024-028346"
},
{
"date": "2025-09-24T19:40:30.147000",
"db": "NVD",
"id": "CVE-2024-53242"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens\u0027 \u00a0Teamcenter\u00a0Visualization\u00a0 and \u00a0Tecnomatix\u00a0Plant\u00a0Simulation\u00a0 Out-of-bounds read vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-028346"
}
],
"trust": 0.8
}
}
VAR-202412-0348
Vulnerability from variot - Updated: 2025-10-03 21:58A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain a stack based overflow vulnerability while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25000). Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files in the wrltojt module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume and improve manufacturing system performance
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202412-0348",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3.0.12"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.2.0.14"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0016"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0005"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0008"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.2"
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"model": "tecnomatix plant simulation",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2302\u003cv2302.0016"
},
{
"model": "tecnomatix plant simulation",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2404\u003cv2404.0005"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v14.2\u003cv14.2.0.14"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v14.3\u003cv14.3.0.12"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2312\u003cv2312.0008"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2406\u003cv2406.0005"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-25-059"
},
{
"db": "CNVD",
"id": "CNVD-2025-02597"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028258"
},
{
"db": "NVD",
"id": "CVE-2024-53041"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rocco Calvi (@TecR0c) with TecSecurity",
"sources": [
{
"db": "ZDI",
"id": "ZDI-25-059"
}
],
"trust": 0.7
},
"cve": "CVE-2024-53041",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2025-02597",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "productcert@siemens.com",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2024-53041",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2024-028258",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2024-53041",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "productcert@siemens.com",
"id": "CVE-2024-53041",
"trust": 1.0,
"value": "High"
},
{
"author": "OTHER",
"id": "JVNDB-2024-028258",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2024-53041",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2025-02597",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-25-059"
},
{
"db": "CNVD",
"id": "CNVD-2025-02597"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028258"
},
{
"db": "NVD",
"id": "CVE-2024-53041"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions \u003c V14.2.0.14), Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.12), Teamcenter Visualization V2312 (All versions \u003c V2312.0008), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0016), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0005). The affected applications contain a stack based overflow vulnerability while parsing specially crafted WRL files. \r\nThis could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25000). Siemens\u0027 Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WRL files in the wrltojt module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume and improve manufacturing system performance",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-53041"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028258"
},
{
"db": "ZDI",
"id": "ZDI-25-059"
},
{
"db": "CNVD",
"id": "CNVD-2025-02597"
}
],
"trust": 2.79
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-53041",
"trust": 3.9
},
{
"db": "SIEMENS",
"id": "SSA-583523",
"trust": 2.4
},
{
"db": "SIEMENS",
"id": "SSA-645131",
"trust": 1.8
},
{
"db": "JVN",
"id": "JVNVU91750786",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-24-347-09",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028258",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-25000",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-25-059",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2025-02597",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-25-059"
},
{
"db": "CNVD",
"id": "CNVD-2025-02597"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028258"
},
{
"db": "NVD",
"id": "CVE-2024-53041"
}
]
},
"id": "VAR-202412-0348",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-02597"
}
],
"trust": 0.8745396
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-02597"
}
]
},
"last_update_date": "2025-10-03T21:58:30.428000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-583523.html"
},
{
"title": "Patch for Siemens Teamcenter Visualization/Tecnomatix Plant Simulation Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/654596"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-25-059"
},
{
"db": "CNVD",
"id": "CNVD-2025-02597"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-121",
"trust": 1.0
},
{
"problemtype": "Stack-based buffer overflow (CWE-121) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-028258"
},
{
"db": "NVD",
"id": "CVE-2024-53041"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-583523.html"
},
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-645131.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91750786/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-53041"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-09"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-25-059"
},
{
"db": "CNVD",
"id": "CNVD-2025-02597"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028258"
},
{
"db": "NVD",
"id": "CVE-2024-53041"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-25-059"
},
{
"db": "CNVD",
"id": "CNVD-2025-02597"
},
{
"db": "JVNDB",
"id": "JVNDB-2024-028258"
},
{
"db": "NVD",
"id": "CVE-2024-53041"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-01-22T00:00:00",
"db": "ZDI",
"id": "ZDI-25-059"
},
{
"date": "2025-02-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-02597"
},
{
"date": "2025-09-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2024-028258"
},
{
"date": "2024-12-10T14:30:46.507000",
"db": "NVD",
"id": "CVE-2024-53041"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-01-22T00:00:00",
"db": "ZDI",
"id": "ZDI-25-059"
},
{
"date": "2025-02-08T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-02597"
},
{
"date": "2025-09-30T08:18:00",
"db": "JVNDB",
"id": "JVNDB-2024-028258"
},
{
"date": "2025-09-24T19:40:50.583000",
"db": "NVD",
"id": "CVE-2024-53041"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens\u0027 \u00a0Teamcenter\u00a0Visualization\u00a0 and \u00a0Tecnomatix\u00a0Plant\u00a0Simulation\u00a0 Stack-based buffer overflow vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2024-028258"
}
],
"trust": 0.8
}
}
VAR-202503-0282
Vulnerability from variot - Updated: 2025-10-03 21:40A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file. This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202503-0282",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0009"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3.0.13"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0021"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0010"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0002"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.0.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0007"
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014756"
},
{
"db": "NVD",
"id": "CVE-2025-23396"
}
]
},
"cve": "CVE-2025-23396",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "productcert@siemens.com",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2025-23396",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2025-014756",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "productcert@siemens.com",
"id": "CVE-2025-23396",
"trust": 1.0,
"value": "High"
},
{
"author": "OTHER",
"id": "JVNDB-2025-014756",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014756"
},
{
"db": "NVD",
"id": "CVE-2025-23396"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.13), Teamcenter Visualization V2312 (All versions \u003c V2312.0009), Teamcenter Visualization V2406 (All versions \u003c V2406.0007), Teamcenter Visualization V2412 (All versions \u003c V2412.0002), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0021), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0010). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted WRL file. \r\nThis could allow an attacker to execute code in the context of the current process. Siemens\u0027 Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2025-23396"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014756"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2025-23396",
"trust": 2.6
},
{
"db": "SIEMENS",
"id": "SSA-050438",
"trust": 1.8
},
{
"db": "ICS CERT",
"id": "ICSA-25-072-01",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU92252869",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014756",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014756"
},
{
"db": "NVD",
"id": "CVE-2025-23396"
}
]
},
"id": "VAR-202503-0282",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.2745396
},
"last_update_date": "2025-10-03T21:40:51.958000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014756"
},
{
"db": "NVD",
"id": "CVE-2025-23396"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-050438.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu92252869/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2025-23396"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-01"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014756"
},
{
"db": "NVD",
"id": "CVE-2025-23396"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014756"
},
{
"db": "NVD",
"id": "CVE-2025-23396"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-09-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2025-014756"
},
{
"date": "2025-03-11T10:15:16.670000",
"db": "NVD",
"id": "CVE-2025-23396"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-09-30T08:48:00",
"db": "JVNDB",
"id": "JVNDB-2025-014756"
},
{
"date": "2025-09-23T15:29:28.730000",
"db": "NVD",
"id": "CVE-2025-23396"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens\u0027 \u00a0Teamcenter\u00a0Visualization\u00a0 and \u00a0Tecnomatix\u00a0Plant\u00a0Simulation\u00a0 Out-of-bounds write vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014756"
}
],
"trust": 0.8
}
}
VAR-202503-0279
Vulnerability from variot - Updated: 2025-10-03 21:35A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files. An attacker could leverage this vulnerability to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume, thereby improving manufacturing system performance
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202503-0279",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0009"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3.0.13"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0021"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0010"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0002"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.0.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0007"
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v14.3\u003c14.3.0.13"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2312\u003c2312.0009"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2406\u003c2406.0007"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2412\u003c2412.0002"
},
{
"model": "tecnomatix plant simulation",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2302\u003c2302.0021"
},
{
"model": "tecnomatix plant simulation",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2404\u003c2404.0010"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09523"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014754"
},
{
"db": "NVD",
"id": "CVE-2025-23402"
}
]
},
"cve": "CVE-2025-23402",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2025-09523",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "productcert@siemens.com",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2025-23402",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2025-014754",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "productcert@siemens.com",
"id": "CVE-2025-23402",
"trust": 1.0,
"value": "High"
},
{
"author": "OTHER",
"id": "JVNDB-2025-014754",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2025-09523",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09523"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014754"
},
{
"db": "NVD",
"id": "CVE-2025-23402"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.13), Teamcenter Visualization V2312 (All versions \u003c V2312.0009), Teamcenter Visualization V2406 (All versions \u003c V2406.0007), Teamcenter Visualization V2412 (All versions \u003c V2412.0002), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0021), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0010). The affected applications contain a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files. \r\nAn attacker could leverage this vulnerability to execute code in the context of the current process. Siemens\u0027 Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume, thereby improving manufacturing system performance",
"sources": [
{
"db": "NVD",
"id": "CVE-2025-23402"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014754"
},
{
"db": "CNVD",
"id": "CNVD-2025-09523"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2025-23402",
"trust": 3.2
},
{
"db": "SIEMENS",
"id": "SSA-050438",
"trust": 2.4
},
{
"db": "ICS CERT",
"id": "ICSA-25-072-01",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU92252869",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014754",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2025-09523",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09523"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014754"
},
{
"db": "NVD",
"id": "CVE-2025-23402"
}
]
},
"id": "VAR-202503-0279",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09523"
}
],
"trust": 0.8745396
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09523"
}
]
},
"last_update_date": "2025-10-03T21:35:10.502000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Siemens Teamcenter Visualization and Siemens Tecnomatix Plant Simulation Resource Management Error Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/687611"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09523"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-416",
"trust": 1.0
},
{
"problemtype": "Use of freed memory (CWE-416) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014754"
},
{
"db": "NVD",
"id": "CVE-2025-23402"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-050438.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu92252869/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2025-23402"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-01"
},
{
"trust": 0.6,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-050438.htmlhttps"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09523"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014754"
},
{
"db": "NVD",
"id": "CVE-2025-23402"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2025-09523"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014754"
},
{
"db": "NVD",
"id": "CVE-2025-23402"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-05-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-09523"
},
{
"date": "2025-09-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2025-014754"
},
{
"date": "2025-03-11T10:15:17.680000",
"db": "NVD",
"id": "CVE-2025-23402"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-05-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-09523"
},
{
"date": "2025-09-30T08:48:00",
"db": "JVNDB",
"id": "JVNDB-2025-014754"
},
{
"date": "2025-09-23T15:28:26.313000",
"db": "NVD",
"id": "CVE-2025-23402"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens\u0027 \u00a0Teamcenter\u00a0Visualization\u00a0 and \u00a0Tecnomatix\u00a0Plant\u00a0Simulation\u00a0 Vulnerability in using free memory in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014754"
}
],
"trust": 0.8
}
}
VAR-202503-0277
Vulnerability from variot - Updated: 2025-10-03 21:00A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202503-0277",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0009"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0021"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3.0.13"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0010"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0002"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.0.0"
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014895"
},
{
"db": "NVD",
"id": "CVE-2025-23401"
}
]
},
"cve": "CVE-2025-23401",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "productcert@siemens.com",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2025-23401",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2025-014895",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "productcert@siemens.com",
"id": "CVE-2025-23401",
"trust": 1.0,
"value": "High"
},
{
"author": "OTHER",
"id": "JVNDB-2025-014895",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014895"
},
{
"db": "NVD",
"id": "CVE-2025-23401"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.13), Teamcenter Visualization V2312 (All versions \u003c V2312.0009), Teamcenter Visualization V2406 (All versions \u003c V2406.0007), Teamcenter Visualization V2412 (All versions \u003c V2412.0002), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0021), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. \r\nThis could allow an attacker to execute code in the context of the current process. Siemens\u0027 Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2025-23401"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014895"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2025-23401",
"trust": 2.6
},
{
"db": "SIEMENS",
"id": "SSA-050438",
"trust": 1.8
},
{
"db": "ICS CERT",
"id": "ICSA-25-072-01",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU92252869",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014895",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014895"
},
{
"db": "NVD",
"id": "CVE-2025-23401"
}
]
},
"id": "VAR-202503-0277",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.2745396
},
"last_update_date": "2025-10-03T21:00:13.327000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-125",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds read (CWE-125) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014895"
},
{
"db": "NVD",
"id": "CVE-2025-23401"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-050438.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu92252869/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2025-23401"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-01"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014895"
},
{
"db": "NVD",
"id": "CVE-2025-23401"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014895"
},
{
"db": "NVD",
"id": "CVE-2025-23401"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-10-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2025-014895"
},
{
"date": "2025-03-11T10:15:17.510000",
"db": "NVD",
"id": "CVE-2025-23401"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-10-02T02:01:00",
"db": "JVNDB",
"id": "JVNDB-2025-014895"
},
{
"date": "2025-09-23T15:28:41.053000",
"db": "NVD",
"id": "CVE-2025-23401"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens\u0027 \u00a0Teamcenter\u00a0Visualization\u00a0 and \u00a0Tecnomatix\u00a0Plant\u00a0Simulation\u00a0 Out-of-bounds read vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014895"
}
],
"trust": 0.8
}
}
VAR-202503-0278
Vulnerability from variot - Updated: 2025-10-03 20:04A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the functions of discrete event simulation to analyze and optimize production volume, thereby improving the performance of manufacturing systems
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202503-0278",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0009"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3.0.13"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0021"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0010"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0002"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.0.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0007"
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v14.3\u003c14.3.0.13"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2312\u003c2312.0009"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2406\u003c2406.0007"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2412\u003c2412.0002"
},
{
"model": "tecnomatix plant simulation",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2302\u003c2302.0021"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09959"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014755"
},
{
"db": "NVD",
"id": "CVE-2025-23398"
}
]
},
"cve": "CVE-2025-23398",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2025-09959",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "productcert@siemens.com",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2025-23398",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2025-014755",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "productcert@siemens.com",
"id": "CVE-2025-23398",
"trust": 1.0,
"value": "High"
},
{
"author": "OTHER",
"id": "JVNDB-2025-014755",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2025-09959",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09959"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014755"
},
{
"db": "NVD",
"id": "CVE-2025-23398"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.13), Teamcenter Visualization V2312 (All versions \u003c V2312.0009), Teamcenter Visualization V2406 (All versions \u003c V2406.0007), Teamcenter Visualization V2412 (All versions \u003c V2412.0002), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0021), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens\u0027 Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the functions of discrete event simulation to analyze and optimize production volume, thereby improving the performance of manufacturing systems",
"sources": [
{
"db": "NVD",
"id": "CVE-2025-23398"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014755"
},
{
"db": "CNVD",
"id": "CNVD-2025-09959"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2025-23398",
"trust": 3.2
},
{
"db": "SIEMENS",
"id": "SSA-050438",
"trust": 2.4
},
{
"db": "ICS CERT",
"id": "ICSA-25-072-01",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU92252869",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014755",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2025-09959",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09959"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014755"
},
{
"db": "NVD",
"id": "CVE-2025-23398"
}
]
},
"id": "VAR-202503-0278",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09959"
}
],
"trust": 0.8745396
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09959"
}
]
},
"last_update_date": "2025-10-03T20:04:41.484000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Siemens Teamcenter Visualization and Siemens Tecnomatix Plant Simulation buffer overflow vulnerability (CNVD-2025-09959)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/688246"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09959"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.0
},
{
"problemtype": "Buffer error (CWE-119) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014755"
},
{
"db": "NVD",
"id": "CVE-2025-23398"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-050438.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu92252869/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2025-23398"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09959"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014755"
},
{
"db": "NVD",
"id": "CVE-2025-23398"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2025-09959"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014755"
},
{
"db": "NVD",
"id": "CVE-2025-23398"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-05-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-09959"
},
{
"date": "2025-09-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2025-014755"
},
{
"date": "2025-03-11T10:15:17.003000",
"db": "NVD",
"id": "CVE-2025-23398"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-05-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-09959"
},
{
"date": "2025-09-30T08:48:00",
"db": "JVNDB",
"id": "JVNDB-2025-014755"
},
{
"date": "2025-09-23T15:29:08.563000",
"db": "NVD",
"id": "CVE-2025-23398"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens\u0027 \u00a0Teamcenter\u00a0Visualization\u00a0 and \u00a0Tecnomatix\u00a0Plant\u00a0Simulation\u00a0 Buffer error vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014755"
}
],
"trust": 0.8
}
}
VAR-202505-1729
Vulnerability from variot - Updated: 2025-10-03 19:44A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.14), Teamcenter Visualization V2312 (All versions < V2312.0010), Teamcenter Visualization V2406 (All versions < V2406.0008), Teamcenter Visualization V2412 (All versions < V2412.0004), Tecnomatix Plant Simulation V2404 (All versions < V2404.0013). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202505-1729",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0010"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.008"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0013"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0004"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3.0.14"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3"
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014894"
},
{
"db": "NVD",
"id": "CVE-2025-32454"
}
]
},
"cve": "CVE-2025-32454",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "productcert@siemens.com",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2025-32454",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2025-014894",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "productcert@siemens.com",
"id": "CVE-2025-32454",
"trust": 1.0,
"value": "High"
},
{
"author": "OTHER",
"id": "JVNDB-2025-014894",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014894"
},
{
"db": "NVD",
"id": "CVE-2025-32454"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.14), Teamcenter Visualization V2312 (All versions \u003c V2312.0010), Teamcenter Visualization V2406 (All versions \u003c V2406.0008), Teamcenter Visualization V2412 (All versions \u003c V2412.0004), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0013). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. \r\nThis could allow an attacker to execute code in the context of the current process. Siemens\u0027 Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2025-32454"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014894"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2025-32454",
"trust": 2.6
},
{
"db": "SIEMENS",
"id": "SSA-486186",
"trust": 1.8
},
{
"db": "SIEMENS",
"id": "SSA-542540",
"trust": 1.8
},
{
"db": "JVN",
"id": "JVNVU92528757",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU96443907",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-25-162-01",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-25-135-06",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014894",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014894"
},
{
"db": "NVD",
"id": "CVE-2025-32454"
}
]
},
"id": "VAR-202505-1729",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.2745396
},
"last_update_date": "2025-10-03T19:44:45.827000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-125",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds read (CWE-125) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014894"
},
{
"db": "NVD",
"id": "CVE-2025-32454"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-486186.html"
},
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-542540.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu92528757/"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu96443907/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2025-32454"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-06"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-01"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014894"
},
{
"db": "NVD",
"id": "CVE-2025-32454"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014894"
},
{
"db": "NVD",
"id": "CVE-2025-32454"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-10-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2025-014894"
},
{
"date": "2025-05-13T10:15:24.953000",
"db": "NVD",
"id": "CVE-2025-32454"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-10-02T02:00:00",
"db": "JVNDB",
"id": "JVNDB-2025-014894"
},
{
"date": "2025-09-23T15:26:08.277000",
"db": "NVD",
"id": "CVE-2025-32454"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens\u0027 \u00a0Teamcenter\u00a0Visualization\u00a0 and \u00a0Tecnomatix\u00a0Plant\u00a0Simulation\u00a0 Out-of-bounds read vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014894"
}
],
"trust": 0.8
}
}
VAR-202503-0284
Vulnerability from variot - Updated: 2025-09-27 23:45A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202503-0284",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0009"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3.0.13"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0021"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0010"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0002"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0002"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0007"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3"
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014515"
},
{
"db": "NVD",
"id": "CVE-2025-27438"
}
]
},
"cve": "CVE-2025-27438",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "productcert@siemens.com",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2025-27438",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2025-014515",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "productcert@siemens.com",
"id": "CVE-2025-27438",
"trust": 1.0,
"value": "High"
},
{
"author": "OTHER",
"id": "JVNDB-2025-014515",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014515"
},
{
"db": "NVD",
"id": "CVE-2025-27438"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.13), Teamcenter Visualization V2312 (All versions \u003c V2312.0009), Teamcenter Visualization V2406 (All versions \u003c V2406.0007), Teamcenter Visualization V2412 (All versions \u003c V2412.0002), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0021), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. \r\nThis could allow an attacker to execute code in the context of the current process. Siemens\u0027 Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2025-27438"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014515"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2025-27438",
"trust": 2.6
},
{
"db": "SIEMENS",
"id": "SSA-050438",
"trust": 1.8
},
{
"db": "JVN",
"id": "JVNVU92252869",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-25-072-01",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014515",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014515"
},
{
"db": "NVD",
"id": "CVE-2025-27438"
}
]
},
"id": "VAR-202503-0284",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.2745396
},
"last_update_date": "2025-09-27T23:45:37.899000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-125",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds read (CWE-125) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014515"
},
{
"db": "NVD",
"id": "CVE-2025-27438"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-050438.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu92252869/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2025-27438"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-01"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014515"
},
{
"db": "NVD",
"id": "CVE-2025-27438"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014515"
},
{
"db": "NVD",
"id": "CVE-2025-27438"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-09-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2025-014515"
},
{
"date": "2025-03-11T10:15:19.407000",
"db": "NVD",
"id": "CVE-2025-27438"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-09-26T06:29:00",
"db": "JVNDB",
"id": "JVNDB-2025-014515"
},
{
"date": "2025-09-23T15:24:03.457000",
"db": "NVD",
"id": "CVE-2025-27438"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens\u0027 \u00a0Teamcenter\u00a0Visualization\u00a0 and \u00a0Tecnomatix\u00a0Plant\u00a0Simulation\u00a0 Out-of-bounds read vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014515"
}
],
"trust": 0.8
}
}
VAR-202503-0283
Vulnerability from variot - Updated: 2025-09-27 20:11A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume, thereby improving the performance of manufacturing systems
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202503-0283",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0009"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3.0.13"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0021"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0010"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0002"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.0.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0007"
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v14.3\u003c14.3.0.13"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2312\u003c2312.0009"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2406\u003c2406.0007"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2412\u003c2412.0002"
},
{
"model": "tecnomatix plant simulation",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2302\u003c2302.0021"
},
{
"model": "tecnomatix plant simulation",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2404\u003c2404.0010"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09578"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014517"
},
{
"db": "NVD",
"id": "CVE-2025-23400"
}
]
},
"cve": "CVE-2025-23400",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2025-09578",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "productcert@siemens.com",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2025-23400",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2025-014517",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "productcert@siemens.com",
"id": "CVE-2025-23400",
"trust": 1.0,
"value": "High"
},
{
"author": "OTHER",
"id": "JVNDB-2025-014517",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2025-09578",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09578"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014517"
},
{
"db": "NVD",
"id": "CVE-2025-23400"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.13), Teamcenter Visualization V2312 (All versions \u003c V2312.0009), Teamcenter Visualization V2406 (All versions \u003c V2406.0007), Teamcenter Visualization V2412 (All versions \u003c V2412.0002), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0021), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens\u0027 Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume, thereby improving the performance of manufacturing systems",
"sources": [
{
"db": "NVD",
"id": "CVE-2025-23400"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014517"
},
{
"db": "CNVD",
"id": "CNVD-2025-09578"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2025-23400",
"trust": 3.2
},
{
"db": "SIEMENS",
"id": "SSA-050438",
"trust": 2.4
},
{
"db": "JVN",
"id": "JVNVU92252869",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-25-072-01",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014517",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2025-09578",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09578"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014517"
},
{
"db": "NVD",
"id": "CVE-2025-23400"
}
]
},
"id": "VAR-202503-0283",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09578"
}
],
"trust": 0.8745396
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09578"
}
]
},
"last_update_date": "2025-09-27T20:11:01.791000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Siemens Teamcenter Visualization and Siemens Tecnomatix Plant Simulation Buffer Overflow Vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/687616"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09578"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.0
},
{
"problemtype": "Buffer error (CWE-119) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014517"
},
{
"db": "NVD",
"id": "CVE-2025-23400"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-050438.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu92252869/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2025-23400"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-01"
},
{
"trust": 0.6,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-050438.htmlhttps"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09578"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014517"
},
{
"db": "NVD",
"id": "CVE-2025-23400"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2025-09578"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014517"
},
{
"db": "NVD",
"id": "CVE-2025-23400"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-05-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-09578"
},
{
"date": "2025-09-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2025-014517"
},
{
"date": "2025-03-11T10:15:17.340000",
"db": "NVD",
"id": "CVE-2025-23400"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-05-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-09578"
},
{
"date": "2025-09-26T06:30:00",
"db": "JVNDB",
"id": "JVNDB-2025-014517"
},
{
"date": "2025-09-23T15:28:48.723000",
"db": "NVD",
"id": "CVE-2025-23400"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens\u0027 \u00a0Teamcenter\u00a0Visualization\u00a0 and \u00a0Tecnomatix\u00a0Plant\u00a0Simulation\u00a0 Buffer error vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014517"
}
],
"trust": 0.8
}
}
VAR-202503-0280
Vulnerability from variot - Updated: 2025-09-25 20:52A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202503-0280",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0009"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3.0.13"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0021"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0010"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0002"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.0.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0007"
},
{
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014326"
},
{
"db": "NVD",
"id": "CVE-2025-23399"
}
]
},
"cve": "CVE-2025-23399",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "productcert@siemens.com",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2025-23399",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2025-014326",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "productcert@siemens.com",
"id": "CVE-2025-23399",
"trust": 1.0,
"value": "High"
},
{
"author": "OTHER",
"id": "JVNDB-2025-014326",
"trust": 0.8,
"value": "High"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014326"
},
{
"db": "NVD",
"id": "CVE-2025-23399"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.13), Teamcenter Visualization V2312 (All versions \u003c V2312.0009), Teamcenter Visualization V2406 (All versions \u003c V2406.0007), Teamcenter Visualization V2412 (All versions \u003c V2412.0002), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0021), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. \r\nThis could allow an attacker to execute code in the context of the current process. Siemens\u0027 Teamcenter Visualization and Tecnomatix Plant Simulation Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2025-23399"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014326"
}
],
"trust": 1.62
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2025-23399",
"trust": 2.6
},
{
"db": "SIEMENS",
"id": "SSA-050438",
"trust": 1.8
},
{
"db": "JVN",
"id": "JVNVU92252869",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-25-072-01",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014326",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014326"
},
{
"db": "NVD",
"id": "CVE-2025-23399"
}
]
},
"id": "VAR-202503-0280",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.2745396
},
"last_update_date": "2025-09-25T20:52:23.196000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-125",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds read (CWE-125) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014326"
},
{
"db": "NVD",
"id": "CVE-2025-23399"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-050438.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu92252869/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2025-23399"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-01"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014326"
},
{
"db": "NVD",
"id": "CVE-2025-23399"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014326"
},
{
"db": "NVD",
"id": "CVE-2025-23399"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-09-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2025-014326"
},
{
"date": "2025-03-11T10:15:17.170000",
"db": "NVD",
"id": "CVE-2025-23399"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-09-24T05:56:00",
"db": "JVNDB",
"id": "JVNDB-2025-014326"
},
{
"date": "2025-09-23T15:28:58.983000",
"db": "NVD",
"id": "CVE-2025-23399"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens\u0027 \u00a0Teamcenter\u00a0Visualization\u00a0 and \u00a0Tecnomatix\u00a0Plant\u00a0Simulation\u00a0 Out-of-bounds read vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014326"
}
],
"trust": 0.8
}
}
VAR-202503-0281
Vulnerability from variot - Updated: 2025-09-25 20:02A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.13), Teamcenter Visualization V2312 (All versions < V2312.0009), Teamcenter Visualization V2406 (All versions < V2406.0007), Teamcenter Visualization V2412 (All versions < V2412.0002), Tecnomatix Plant Simulation V2302 (All versions < V2302.0021), Tecnomatix Plant Simulation V2404 (All versions < V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume, thereby improving manufacturing system performance
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202503-0281",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0009"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2312.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "14.3.0.13"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2302.0021"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0"
},
{
"model": "tecnomatix plant simulation",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0010"
},
{
"model": "tecnomatix plant simulation",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2404.0"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2412.0002"
},
{
"model": "teamcenter visualization",
"scope": "gte",
"trust": 1.0,
"vendor": "siemens",
"version": "14.0.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2406.0007"
},
{
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "tecnomatix plant simulation",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v14.3\u003c14.3.0.13"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2312\u003c2312.0009"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2406\u003c2406.0007"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2412\u003c2412.0002"
},
{
"model": "tecnomatix plant simulation",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v2302\u003c2302.0021"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09960"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014327"
},
{
"db": "NVD",
"id": "CVE-2025-23397"
}
]
},
"cve": "CVE-2025-23397",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2025-09960",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "productcert@siemens.com",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2025-23397",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2025-014327",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "productcert@siemens.com",
"id": "CVE-2025-23397",
"trust": 1.0,
"value": "High"
},
{
"author": "OTHER",
"id": "JVNDB-2025-014327",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2025-09960",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09960"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014327"
},
{
"db": "NVD",
"id": "CVE-2025-23397"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions \u003c V14.3.0.13), Teamcenter Visualization V2312 (All versions \u003c V2312.0009), Teamcenter Visualization V2406 (All versions \u003c V2406.0007), Teamcenter Visualization V2412 (All versions \u003c V2412.0002), Tecnomatix Plant Simulation V2302 (All versions \u003c V2302.0021), Tecnomatix Plant Simulation V2404 (All versions \u003c V2404.0010). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Siemens\u0027 Teamcenter Visualization and Tecnomatix Plant Simulation Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Siemens Teamcenter Visualization is a software that provides team collaboration capabilities for designing 2D and 3D scenes. The software simplifies engineering and manufacturing processes by creating virtual prototypes from a variety of mechanical computer-aided design (MCAD) formats. Siemens Tecnomatix Plant Simulation is an industrial control device. Use the power of discrete event simulation to analyze and optimize production volume, thereby improving manufacturing system performance",
"sources": [
{
"db": "NVD",
"id": "CVE-2025-23397"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014327"
},
{
"db": "CNVD",
"id": "CNVD-2025-09960"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2025-23397",
"trust": 3.2
},
{
"db": "SIEMENS",
"id": "SSA-050438",
"trust": 2.4
},
{
"db": "JVN",
"id": "JVNVU92252869",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-25-072-01",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014327",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2025-09960",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09960"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014327"
},
{
"db": "NVD",
"id": "CVE-2025-23397"
}
]
},
"id": "VAR-202503-0281",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09960"
}
],
"trust": 0.8745396
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09960"
}
]
},
"last_update_date": "2025-09-25T20:02:56.694000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Siemens Teamcenter Visualization Buffer Overflow Vulnerability (CNVD-2025-09960)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/688251"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09960"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.0
},
{
"problemtype": "Buffer error (CWE-119) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014327"
},
{
"db": "NVD",
"id": "CVE-2025-23397"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-050438.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu92252869/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2025-23397"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-01"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-09960"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014327"
},
{
"db": "NVD",
"id": "CVE-2025-23397"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2025-09960"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-014327"
},
{
"db": "NVD",
"id": "CVE-2025-23397"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-05-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-09960"
},
{
"date": "2025-09-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2025-014327"
},
{
"date": "2025-03-11T10:15:16.840000",
"db": "NVD",
"id": "CVE-2025-23397"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-05-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-09960"
},
{
"date": "2025-09-24T05:56:00",
"db": "JVNDB",
"id": "JVNDB-2025-014327"
},
{
"date": "2025-09-23T15:29:20.400000",
"db": "NVD",
"id": "CVE-2025-23397"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens\u0027 \u00a0Teamcenter\u00a0Visualization\u00a0 and \u00a0Tecnomatix\u00a0Plant\u00a0Simulation\u00a0 Buffer error vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-014327"
}
],
"trust": 0.8
}
}
VAR-202101-0350
Vulnerability from variot - Updated: 2024-11-23 21:31A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892). Several Siemens products are vulnerable to out-of-bounds writes. Zero Day Initiative To this vulnerability ZDI-CAN-11892 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,
VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "solid edge",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "se2021"
},
{
"_id": null,
"model": "solid edge",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": "se2021"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "solid edge",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-050"
},
{
"db": "CNVD",
"id": "CNVD-2021-02582"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "NVD",
"id": "CVE-2020-26989"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-050"
}
],
"trust": 0.7
},
"cve": "CVE-2020-26989",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26989",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02582",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26989",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26989",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26989",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26989",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-26989",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-26989",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2021-02582",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-848",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-050"
},
{
"db": "CNVD",
"id": "CNVD-2021-02582"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-848"
},
{
"db": "NVD",
"id": "CVE-2020-26989"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Solid Edge SE2020 (All Versions \u003c SE2020MP12), Solid Edge SE2021 (All Versions \u003c SE2021MP2), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892). Several Siemens products are vulnerable to out-of-bounds writes. Zero Day Initiative To this vulnerability ZDI-CAN-11892 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,\r\n\r\nVFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26989"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "ZDI",
"id": "ZDI-21-050"
},
{
"db": "CNVD",
"id": "CNVD-2021-02582"
}
],
"trust": 2.79
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-26989",
"trust": 3.7
},
{
"db": "ZDI",
"id": "ZDI-21-050",
"trust": 3.1
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "SIEMENS",
"id": "SSA-663999",
"trust": 1.6
},
{
"db": "SIEMENS",
"id": "SSA-979834",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11892",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-02582",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0495",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-040-06",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-848",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-050"
},
{
"db": "CNVD",
"id": "CNVD-2021-02582"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-848"
},
{
"db": "NVD",
"id": "CVE-2020-26989"
}
]
},
"id": "VAR-202101-0350",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02582"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02582"
}
]
},
"last_update_date": "2024-11-23T21:31:23.872000Z",
"patch": {
"_id": null,
"data": [
{
"title": "SSA-979834",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"title": "Patch for JT2Go and Teamcenter Visualization heap buffer overflow vulnerability (CNVD-2021-02582)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/243982"
},
{
"title": "Siemens Jt2go and Teamcenter Visualization Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139359"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-050"
},
{
"db": "CNVD",
"id": "CNVD-2021-02582"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-848"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-121",
"trust": 1.0
},
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "NVD",
"id": "CVE-2020-26989"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-050/"
},
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.6,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"trust": 1.6,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26989"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0495"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-050"
},
{
"db": "CNVD",
"id": "CNVD-2021-02582"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-848"
},
{
"db": "NVD",
"id": "CVE-2020-26989"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-050",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2021-02582",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-848",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-26989",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-050",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02582",
"ident": null
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015271",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-848",
"ident": null
},
{
"date": "2021-01-12T21:15:17.183000",
"db": "NVD",
"id": "CVE-2020-26989",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-050",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02582",
"ident": null
},
{
"date": "2021-09-15T08:33:00",
"db": "JVNDB",
"id": "JVNDB-2020-015271",
"ident": null
},
{
"date": "2021-07-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-848",
"ident": null
},
{
"date": "2024-11-21T05:20:38.207000",
"db": "NVD",
"id": "CVE-2020-26989",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-848"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Out-of-bounds write vulnerabilities in multiple Siemens products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-848"
}
],
"trust": 0.6
}
}
VAR-202101-0349
Vulnerability from variot - Updated: 2024-11-23 21:29A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11891). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-11891 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,
VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment.
JT2Go and Teamcenter Visualization have security vulnerabilities
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-049"
},
{
"db": "CNVD",
"id": "CNVD-2021-02583"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015270"
},
{
"db": "NVD",
"id": "CVE-2020-26988"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-049"
}
],
"trust": 0.7
},
"cve": "CVE-2020-26988",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26988",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02583",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-26988",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26988",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26988",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26988",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-26988",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-26988",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2021-02583",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-845",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-049"
},
{
"db": "CNVD",
"id": "CNVD-2021-02583"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015270"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-845"
},
{
"db": "NVD",
"id": "CVE-2020-26988"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0), Teamcenter Visualization (All versions \u003c V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11891). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-11891 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,\r\n\r\nVFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment. \n\r\n\r\nJT2Go and Teamcenter Visualization have security vulnerabilities",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26988"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015270"
},
{
"db": "ZDI",
"id": "ZDI-21-049"
},
{
"db": "CNVD",
"id": "CNVD-2021-02583"
}
],
"trust": 2.79
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-26988",
"trust": 3.7
},
{
"db": "ZDI",
"id": "ZDI-21-049",
"trust": 3.1
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015270",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11891",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-02583",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-845",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-049"
},
{
"db": "CNVD",
"id": "CNVD-2021-02583"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015270"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-845"
},
{
"db": "NVD",
"id": "CVE-2020-26988"
}
]
},
"id": "VAR-202101-0349",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02583"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02583"
}
]
},
"last_update_date": "2024-11-23T21:29:48.209000Z",
"patch": {
"_id": null,
"data": [
{
"title": "SSA-622830",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"title": "Patch for Unspecified vulnerability exists in JT2Go and Teamcenter Visualization (CNVD-2021-02583)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/243985"
},
{
"title": "Siemens Jt2go and Teamcenter Visualization Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139357"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-049"
},
{
"db": "CNVD",
"id": "CNVD-2021-02583"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015270"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-845"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015270"
},
{
"db": "NVD",
"id": "CVE-2020-26988"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-049/"
},
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26988"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-049"
},
{
"db": "CNVD",
"id": "CNVD-2021-02583"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015270"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-845"
},
{
"db": "NVD",
"id": "CVE-2020-26988"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-049",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2021-02583",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015270",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-845",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-26988",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-049",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02583",
"ident": null
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015270",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-845",
"ident": null
},
{
"date": "2021-01-12T21:15:17.120000",
"db": "NVD",
"id": "CVE-2020-26988",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-049",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02583",
"ident": null
},
{
"date": "2021-09-15T08:33:00",
"db": "JVNDB",
"id": "JVNDB-2020-015270",
"ident": null
},
{
"date": "2021-02-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-845",
"ident": null
},
{
"date": "2024-11-21T05:20:38.093000",
"db": "NVD",
"id": "CVE-2020-26988",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-845"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "JT2Go\u00a0 and \u00a0Teamcenter\u00a0Visualization\u00a0 Out-of-bounds Vulnerability in Microsoft",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015270"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-845"
}
],
"trust": 0.6
}
}
VAR-202101-0344
Vulnerability from variot - Updated: 2024-11-23 21:22A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing PDF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11900). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-11900 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,
VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment.
JT2Go and Teamcenter Visualization has an unspecified vulnerability
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-054"
},
{
"db": "CNVD",
"id": "CNVD-2021-02588"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015265"
},
{
"db": "NVD",
"id": "CVE-2020-26983"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-054"
}
],
"trust": 0.7
},
"cve": "CVE-2020-26983",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26983",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02588",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-26983",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26983",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26983",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26983",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-26983",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-26983",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2021-02588",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-852",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-054"
},
{
"db": "CNVD",
"id": "CNVD-2021-02588"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015265"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-852"
},
{
"db": "NVD",
"id": "CVE-2020-26983"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0), Teamcenter Visualization (All versions \u003c V13.1.0). Affected applications lack proper validation of user-supplied data when parsing PDF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11900). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-11900 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,\r\n\r\nVFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment. \n\r\n\r\nJT2Go and Teamcenter Visualization has an unspecified vulnerability",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26983"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015265"
},
{
"db": "ZDI",
"id": "ZDI-21-054"
},
{
"db": "CNVD",
"id": "CNVD-2021-02588"
}
],
"trust": 2.79
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-26983",
"trust": 3.7
},
{
"db": "ZDI",
"id": "ZDI-21-054",
"trust": 3.1
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015265",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11900",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-02588",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-852",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-054"
},
{
"db": "CNVD",
"id": "CNVD-2021-02588"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015265"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-852"
},
{
"db": "NVD",
"id": "CVE-2020-26983"
}
]
},
"id": "VAR-202101-0344",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02588"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02588"
}
]
},
"last_update_date": "2024-11-23T21:22:00.173000Z",
"patch": {
"_id": null,
"data": [
{
"title": "SSA-622830",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"title": "Patch for Unspecified vulnerability exists in JT2Go and Teamcenter Visualization (CNVD-2021-02588)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/244000"
},
{
"title": "Siemens Jt2go and Siemens Teamcenter Visualization Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139363"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-054"
},
{
"db": "CNVD",
"id": "CNVD-2021-02588"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015265"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-852"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015265"
},
{
"db": "NVD",
"id": "CVE-2020-26983"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-054/"
},
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26983"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-054"
},
{
"db": "CNVD",
"id": "CNVD-2021-02588"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015265"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-852"
},
{
"db": "NVD",
"id": "CVE-2020-26983"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-054",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2021-02588",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015265",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-852",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-26983",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-054",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02588",
"ident": null
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015265",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-852",
"ident": null
},
{
"date": "2021-01-12T21:15:16.823000",
"db": "NVD",
"id": "CVE-2020-26983",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-054",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02588",
"ident": null
},
{
"date": "2021-09-15T08:33:00",
"db": "JVNDB",
"id": "JVNDB-2020-015265",
"ident": null
},
{
"date": "2021-02-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-852",
"ident": null
},
{
"date": "2024-11-21T05:20:37.530000",
"db": "NVD",
"id": "CVE-2020-26983",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-852"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "JT2Go\u00a0 and \u00a0Teamcenter\u00a0Visualization\u00a0 Out-of-bounds Vulnerability in Microsoft",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015265"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-852"
}
],
"trust": 0.6
}
}
VAR-202101-0354
Vulnerability from variot - Updated: 2024-11-23 21:10A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing CGM files. This could lead to a stack based buffer overflow while trying to copy to a buffer in the font index handling function. An attacker could leverage this vulnerability to execute code in the context of the current process. JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT, VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202101-0354",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0"
},
{
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "jt2go",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02578"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015257"
},
{
"db": "NVD",
"id": "CVE-2020-26993"
}
]
},
"cve": "CVE-2020-26993",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26993",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02578",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26993",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26993",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26993",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-26993",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-02578",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-873",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02578"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015257"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-873"
},
{
"db": "NVD",
"id": "CVE-2020-26993"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0), Teamcenter Visualization (All versions \u003c V13.1.0). Affected applications lack proper validation of user-supplied data when parsing CGM files. This could lead to a stack based buffer overflow while trying to copy to a buffer in the font index handling function. An attacker could leverage this vulnerability to execute code in the context of the current process. JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT, VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26993"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015257"
},
{
"db": "CNVD",
"id": "CNVD-2021-02578"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-26993",
"trust": 3.0
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015257",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-02578",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-873",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02578"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015257"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-873"
},
{
"db": "NVD",
"id": "CVE-2020-26993"
}
]
},
"id": "VAR-202101-0354",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02578"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02578"
}
]
},
"last_update_date": "2024-11-23T21:10:16.580000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-622830",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Patch for JT2Go and Teamcenter Visualization stack buffer overflow vulnerability (CNVD-2021-02578)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/243970"
},
{
"title": "Siemens JTGo Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139374"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02578"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015257"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-873"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-121",
"trust": 1.0
},
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015257"
},
{
"db": "NVD",
"id": "CVE-2020-26993"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26993"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02578"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015257"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-873"
},
{
"db": "NVD",
"id": "CVE-2020-26993"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-02578"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015257"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-873"
},
{
"db": "NVD",
"id": "CVE-2020-26993"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02578"
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015257"
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-873"
},
{
"date": "2021-01-12T21:15:17.447000",
"db": "NVD",
"id": "CVE-2020-26993"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02578"
},
{
"date": "2021-09-15T08:32:00",
"db": "JVNDB",
"id": "JVNDB-2020-015257"
},
{
"date": "2021-02-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-873"
},
{
"date": "2024-11-21T05:20:38.710000",
"db": "NVD",
"id": "CVE-2020-26993"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-873"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "JT2Go\u00a0 and \u00a0Teamcenter\u00a0Visualization\u00a0 Out-of-bounds Vulnerability in Microsoft",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015257"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-873"
}
],
"trust": 0.6
}
}
VAR-202101-1897
Vulnerability from variot - Updated: 2024-11-23 21:09An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. The development kit accesses the data in .dwg and .dgn through a convenient, object-oriented API, and provides functions such as C++ API, support for repairing files, and support for .NET, JAVA, and Python development languages
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "drawings software development kit",
"scope": "lt",
"trust": 1.0,
"vendor": "opendesign",
"version": "2021.12"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "comos",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "10.4.1"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "drawings sdk",
"scope": null,
"trust": 0.8,
"vendor": "open design alliance",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-226"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002745"
},
{
"db": "NVD",
"id": "CVE-2021-25174"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-226"
}
],
"trust": 0.7
},
"cve": "CVE-2021-25174",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2021-25174",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-383903",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-25174",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2021-25174",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-25174",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-25174",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2021-25174",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2021-25174",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-1323",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-383903",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-226"
},
{
"db": "VULHUB",
"id": "VHN-383903"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002745"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1323"
},
{
"db": "NVD",
"id": "CVE-2021-25174"
}
]
},
"description": {
"_id": null,
"data": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. The development kit accesses the data in .dwg and .dgn through a convenient, object-oriented API, and provides functions such as C++ API, support for repairing files, and support for .NET, JAVA, and Python development languages",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-25174"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002745"
},
{
"db": "ZDI",
"id": "ZDI-21-226"
},
{
"db": "VULHUB",
"id": "VHN-383903"
}
],
"trust": 2.34
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2021-25174",
"trust": 3.2
},
{
"db": "ZDI",
"id": "ZDI-21-226",
"trust": 3.2
},
{
"db": "SIEMENS",
"id": "SSA-155599",
"trust": 1.7
},
{
"db": "SIEMENS",
"id": "SSA-663999",
"trust": 1.7
},
{
"db": "ICS CERT",
"id": "ICSA-21-047-01",
"trust": 1.4
},
{
"db": "JVN",
"id": "JVNVU92291213",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002745",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-12026",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1323",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2021.0577",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2022.1047",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-22-069-06",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-040-06",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2022031102",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-383903",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-226"
},
{
"db": "VULHUB",
"id": "VHN-383903"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002745"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1323"
},
{
"db": "NVD",
"id": "CVE-2021-25174"
}
]
},
"id": "VAR-202101-1897",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-383903"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-23T21:09:20.319000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Vulnerabilities\u00a0in\u00a0the\u00a0ODA\u00a0Drawings\u00a0Software\u00a0Development\u00a0Kit Siemens Siemens\u00a0Security\u00a0Advisory",
"trust": 0.8,
"url": "https://www.opendesign.com/security-advisories"
},
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"title": "Open Design Alliance Drawings SDK Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139579"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-226"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002745"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1323"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "Resource exhaustion (CWE-400) [NVD Evaluation ]",
"trust": 0.8
},
{
"problemtype": "CWE-400",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-383903"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002745"
},
{
"db": "NVD",
"id": "CVE-2021-25174"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.5,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-226/"
},
{
"trust": 1.7,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf"
},
{
"trust": 1.7,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"trust": 1.7,
"url": "https://www.opendesign.com/security-advisories"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-25174"
},
{
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-047-01"
},
{
"trust": 1.3,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu92291213/index.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.1047"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0577"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2022031102"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-069-06"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-226"
},
{
"db": "VULHUB",
"id": "VHN-383903"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002745"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1323"
},
{
"db": "NVD",
"id": "CVE-2021-25174"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-226",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-383903",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002745",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1323",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2021-25174",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-226",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "VULHUB",
"id": "VHN-383903",
"ident": null
},
{
"date": "2021-09-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-002745",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-1323",
"ident": null
},
{
"date": "2021-01-18T08:15:13.117000",
"db": "NVD",
"id": "CVE-2021-25174",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-226",
"ident": null
},
{
"date": "2022-04-08T00:00:00",
"db": "VULHUB",
"id": "VHN-383903",
"ident": null
},
{
"date": "2021-09-29T08:26:00",
"db": "JVNDB",
"id": "JVNDB-2021-002745",
"ident": null
},
{
"date": "2022-04-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-1323",
"ident": null
},
{
"date": "2024-11-21T05:54:30.027000",
"db": "NVD",
"id": "CVE-2021-25174",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-1323"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Open\u00a0Design\u00a0Alliance\u00a0Drawings\u00a0SDK\u00a0 Resource Depletion Vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-002745"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-1323"
}
],
"trust": 0.6
}
}
VAR-202101-0347
Vulnerability from variot - Updated: 2024-11-23 21:05A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of JT files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12014). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-12014 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of JT files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,
VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-057"
},
{
"db": "CNVD",
"id": "CNVD-2021-02585"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015268"
},
{
"db": "NVD",
"id": "CVE-2020-26986"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-057"
}
],
"trust": 0.7
},
"cve": "CVE-2020-26986",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26986",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02585",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-26986",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26986",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26986",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26986",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-26986",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-26986",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2021-02585",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-850",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-057"
},
{
"db": "CNVD",
"id": "CNVD-2021-02585"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015268"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-850"
},
{
"db": "NVD",
"id": "CVE-2020-26986"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0), Teamcenter Visualization (All versions \u003c V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of JT files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12014). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-12014 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of JT files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,\r\n\r\nVFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26986"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015268"
},
{
"db": "ZDI",
"id": "ZDI-21-057"
},
{
"db": "CNVD",
"id": "CNVD-2021-02585"
}
],
"trust": 2.79
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-26986",
"trust": 3.7
},
{
"db": "ZDI",
"id": "ZDI-21-057",
"trust": 3.1
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015268",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-12014",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-02585",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-850",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-057"
},
{
"db": "CNVD",
"id": "CNVD-2021-02585"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015268"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-850"
},
{
"db": "NVD",
"id": "CVE-2020-26986"
}
]
},
"id": "VAR-202101-0347",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02585"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02585"
}
]
},
"last_update_date": "2024-11-23T21:05:14.135000Z",
"patch": {
"_id": null,
"data": [
{
"title": "SSA-622830",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"title": "Patch for JT2Go and Teamcenter Visualization heap buffer overflow vulnerability (CNVD-2021-02585)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/243991"
},
{
"title": "Siemens Jt2go and Teamcenter Visualization Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139361"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-057"
},
{
"db": "CNVD",
"id": "CNVD-2021-02585"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015268"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-850"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-122",
"trust": 1.0
},
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015268"
},
{
"db": "NVD",
"id": "CVE-2020-26986"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-057/"
},
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26986"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-057"
},
{
"db": "CNVD",
"id": "CNVD-2021-02585"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015268"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-850"
},
{
"db": "NVD",
"id": "CVE-2020-26986"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-057",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2021-02585",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015268",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-850",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-26986",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-057",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02585",
"ident": null
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015268",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-850",
"ident": null
},
{
"date": "2021-01-12T21:15:16.997000",
"db": "NVD",
"id": "CVE-2020-26986",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-057",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02585",
"ident": null
},
{
"date": "2021-09-15T08:33:00",
"db": "JVNDB",
"id": "JVNDB-2020-015268",
"ident": null
},
{
"date": "2021-02-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-850",
"ident": null
},
{
"date": "2024-11-21T05:20:37.863000",
"db": "NVD",
"id": "CVE-2020-26986",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-850"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "JT2Go\u00a0 and \u00a0Teamcenter\u00a0Visualization\u00a0 Out-of-bounds Vulnerability in Microsoft",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015268"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-850"
}
],
"trust": 0.6
}
}
VAR-202101-0342
Vulnerability from variot - Updated: 2024-11-23 21:02A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). When opening a specially crafted xml file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11890). JT2Go and Teamcenter Visualization Has XML An external entity vulnerability exists. Zero Day Initiative To this vulnerability ZDI-CAN-11890 Was numbered.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PLMXML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,
VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-048"
},
{
"db": "CNVD",
"id": "CNVD-2021-02590"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015263"
},
{
"db": "NVD",
"id": "CVE-2020-26981"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-048"
}
],
"trust": 0.7
},
"cve": "CVE-2020-26981",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26981",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.6,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02590",
"impactScore": 7.8,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-26981",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 6.5,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26981",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26981",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26981",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2020-26981",
"trust": 0.8,
"value": "Medium"
},
{
"author": "ZDI",
"id": "CVE-2020-26981",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2021-02590",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-923",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-048"
},
{
"db": "CNVD",
"id": "CNVD-2021-02590"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015263"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-923"
},
{
"db": "NVD",
"id": "CVE-2020-26981"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0), Teamcenter Visualization (All versions \u003c V13.1.0). When opening a specially crafted xml file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11890). JT2Go and Teamcenter Visualization Has XML An external entity vulnerability exists. Zero Day Initiative To this vulnerability ZDI-CAN-11890 Was numbered.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PLMXML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,\r\n\r\nVFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26981"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015263"
},
{
"db": "ZDI",
"id": "ZDI-21-048"
},
{
"db": "CNVD",
"id": "CNVD-2021-02590"
}
],
"trust": 2.79
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-26981",
"trust": 3.7
},
{
"db": "ZDI",
"id": "ZDI-21-048",
"trust": 3.1
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015263",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11890",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-02590",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-923",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-048"
},
{
"db": "CNVD",
"id": "CNVD-2021-02590"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015263"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-923"
},
{
"db": "NVD",
"id": "CVE-2020-26981"
}
]
},
"id": "VAR-202101-0342",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02590"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02590"
}
]
},
"last_update_date": "2024-11-23T21:02:57.121000Z",
"patch": {
"_id": null,
"data": [
{
"title": "SSA-622830",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"title": "Patch for JT2Go and Teamcenter VisualizationXML External Entity Reference Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/244006"
},
{
"title": "Siemens Jt2go and Siemens Teamcenter Visualization Fixes for code issue vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138851"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-048"
},
{
"db": "CNVD",
"id": "CNVD-2021-02590"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015263"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-923"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-611",
"trust": 1.0
},
{
"problemtype": "XML Improper restrictions on external entity references (CWE-611) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015263"
},
{
"db": "NVD",
"id": "CVE-2020-26981"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-048/"
},
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26981"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-048"
},
{
"db": "CNVD",
"id": "CNVD-2021-02590"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015263"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-923"
},
{
"db": "NVD",
"id": "CVE-2020-26981"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-048",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2021-02590",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015263",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-923",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-26981",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-048",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02590",
"ident": null
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015263",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-923",
"ident": null
},
{
"date": "2021-01-12T21:15:16.683000",
"db": "NVD",
"id": "CVE-2020-26981",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-048",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02590",
"ident": null
},
{
"date": "2021-09-15T08:33:00",
"db": "JVNDB",
"id": "JVNDB-2020-015263",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-923",
"ident": null
},
{
"date": "2024-11-21T05:20:37.307000",
"db": "NVD",
"id": "CVE-2020-26981",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-923"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "JT2Go\u00a0 and \u00a0Teamcenter\u00a0Visualization\u00a0 In \u00a0XML\u00a0 External entity vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015263"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "code problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-923"
}
],
"trust": 0.6
}
}
VAR-202101-0353
Vulnerability from variot - Updated: 2024-11-23 20:49A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing CGM files. This could lead to a stack based buffer overflow while trying to copy to a buffer during font string handling. An attacker could leverage this vulnerability to execute code in the context of the current process. JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT, VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202101-0353",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0"
},
{
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"model": "jt2go",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"model": "teamcenter visualization",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02579"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015256"
},
{
"db": "NVD",
"id": "CVE-2020-26992"
}
]
},
"cve": "CVE-2020-26992",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26992",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02579",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26992",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26992",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26992",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-26992",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-02579",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-843",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02579"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015256"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-843"
},
{
"db": "NVD",
"id": "CVE-2020-26992"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0), Teamcenter Visualization (All versions \u003c V13.1.0). Affected applications lack proper validation of user-supplied data when parsing CGM files. This could lead to a stack based buffer overflow while trying to copy to a buffer during font string handling. An attacker could leverage this vulnerability to execute code in the context of the current process. JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT, VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26992"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015256"
},
{
"db": "CNVD",
"id": "CNVD-2021-02579"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-26992",
"trust": 3.0
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015256",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-02579",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-843",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02579"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015256"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-843"
},
{
"db": "NVD",
"id": "CVE-2020-26992"
}
]
},
"id": "VAR-202101-0353",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02579"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02579"
}
]
},
"last_update_date": "2024-11-23T20:49:07.528000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-622830",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Patch for JT2Go and Teamcenter Visualization stack buffer overflow vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/243973"
},
{
"title": "Siemens JTGo Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139355"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02579"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015256"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-843"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-121",
"trust": 1.0
},
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015256"
},
{
"db": "NVD",
"id": "CVE-2020-26992"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26992"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02579"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015256"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-843"
},
{
"db": "NVD",
"id": "CVE-2020-26992"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-02579"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015256"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-843"
},
{
"db": "NVD",
"id": "CVE-2020-26992"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02579"
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015256"
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-843"
},
{
"date": "2021-01-12T21:15:17.387000",
"db": "NVD",
"id": "CVE-2020-26992"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02579"
},
{
"date": "2021-09-15T08:31:00",
"db": "JVNDB",
"id": "JVNDB-2020-015256"
},
{
"date": "2021-02-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-843"
},
{
"date": "2024-11-21T05:20:38.580000",
"db": "NVD",
"id": "CVE-2020-26992"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-843"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "JT2Go\u00a0 and \u00a0Teamcenter\u00a0Visualization\u00a0 Out-of-bounds Vulnerability in Microsoft",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015256"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-843"
}
],
"trust": 0.6
}
}
VAR-202101-0343
Vulnerability from variot - Updated: 2024-11-23 20:48A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing CG4 and CGM files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11898). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-11898 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CG4 and CGM files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,
VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment.
JT2Go and Teamcenter Visualization has an unspecified vulnerability
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-052"
},
{
"db": "CNVD",
"id": "CNVD-2021-02589"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015264"
},
{
"db": "NVD",
"id": "CVE-2020-26982"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-052"
}
],
"trust": 0.7
},
"cve": "CVE-2020-26982",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26982",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02589",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-26982",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26982",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26982",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26982",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-26982",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-26982",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2021-02589",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-921",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-052"
},
{
"db": "CNVD",
"id": "CNVD-2021-02589"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015264"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-921"
},
{
"db": "NVD",
"id": "CVE-2020-26982"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0), Teamcenter Visualization (All versions \u003c V13.1.0). Affected applications lack proper validation of user-supplied data when parsing CG4 and CGM files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11898). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-11898 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CG4 and CGM files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,\r\n\r\nVFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment. \n\r\n\r\nJT2Go and Teamcenter Visualization has an unspecified vulnerability",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26982"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015264"
},
{
"db": "ZDI",
"id": "ZDI-21-052"
},
{
"db": "CNVD",
"id": "CNVD-2021-02589"
}
],
"trust": 2.79
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-26982",
"trust": 3.7
},
{
"db": "ZDI",
"id": "ZDI-21-052",
"trust": 3.1
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015264",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11898",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-02589",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-921",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-052"
},
{
"db": "CNVD",
"id": "CNVD-2021-02589"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015264"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-921"
},
{
"db": "NVD",
"id": "CVE-2020-26982"
}
]
},
"id": "VAR-202101-0343",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02589"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02589"
}
]
},
"last_update_date": "2024-11-23T20:48:21.973000Z",
"patch": {
"_id": null,
"data": [
{
"title": "SSA-622830",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"title": "Patch for Unidentified vulnerabilities in JT2Go and Teamcenter Visualization",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/244003"
},
{
"title": "Siemens Jt2go and Siemens Teamcenter Visualization Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139396"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-052"
},
{
"db": "CNVD",
"id": "CNVD-2021-02589"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015264"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-921"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015264"
},
{
"db": "NVD",
"id": "CVE-2020-26982"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-052/"
},
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26982"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-052"
},
{
"db": "CNVD",
"id": "CNVD-2021-02589"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015264"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-921"
},
{
"db": "NVD",
"id": "CVE-2020-26982"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-052",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2021-02589",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015264",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-921",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-26982",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-052",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02589",
"ident": null
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015264",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-921",
"ident": null
},
{
"date": "2021-01-12T21:15:16.747000",
"db": "NVD",
"id": "CVE-2020-26982",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-052",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02589",
"ident": null
},
{
"date": "2021-09-15T08:33:00",
"db": "JVNDB",
"id": "JVNDB-2020-015264",
"ident": null
},
{
"date": "2021-02-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-921",
"ident": null
},
{
"date": "2024-11-21T05:20:37.417000",
"db": "NVD",
"id": "CVE-2020-26982",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-921"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "JT2Go\u00a0 and \u00a0Teamcenter\u00a0Visualization\u00a0 Out-of-bounds Vulnerability in Microsoft",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015264"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-921"
}
],
"trust": 0.6
}
}
VAR-202101-1900
Vulnerability from variot - Updated: 2024-11-23 20:48An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Confusion issue exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. The development kit accesses the data in .dwg and .dgn through a convenient, object-oriented API, and provides functions such as C++ API, support for repairing files, and support for .NET, JAVA, and Python development languages
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "drawings software development kit",
"scope": "lt",
"trust": 1.0,
"vendor": "opendesign",
"version": "2021.11"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "comos",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "10.4.1"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "drawings sdk",
"scope": null,
"trust": 0.8,
"vendor": "open design alliance",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-219"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002748"
},
{
"db": "NVD",
"id": "CVE-2021-25177"
}
]
},
"credits": {
"_id": null,
"data": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-219"
}
],
"trust": 0.7
},
"cve": "CVE-2021-25177",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2021-25177",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-383906",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-25177",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2021-25177",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-25177",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-25177",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2021-25177",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2021-25177",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-1315",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-383906",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-219"
},
{
"db": "VULHUB",
"id": "VHN-383906"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002748"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1315"
},
{
"db": "NVD",
"id": "CVE-2021-25177"
}
]
},
"description": {
"_id": null,
"data": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Confusion issue exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. The development kit accesses the data in .dwg and .dgn through a convenient, object-oriented API, and provides functions such as C++ API, support for repairing files, and support for .NET, JAVA, and Python development languages",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-25177"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002748"
},
{
"db": "ZDI",
"id": "ZDI-21-219"
},
{
"db": "VULHUB",
"id": "VHN-383906"
}
],
"trust": 2.34
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2021-25177",
"trust": 3.2
},
{
"db": "ZDI",
"id": "ZDI-21-219",
"trust": 3.2
},
{
"db": "SIEMENS",
"id": "SSA-155599",
"trust": 1.7
},
{
"db": "SIEMENS",
"id": "SSA-663999",
"trust": 1.7
},
{
"db": "ICS CERT",
"id": "ICSA-21-047-01",
"trust": 1.4
},
{
"db": "JVN",
"id": "JVNVU92291213",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002748",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11927",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1315",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2022.1047",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0577",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2022031102",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-22-069-06",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-040-06",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-383906",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-219"
},
{
"db": "VULHUB",
"id": "VHN-383906"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002748"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1315"
},
{
"db": "NVD",
"id": "CVE-2021-25177"
}
]
},
"id": "VAR-202101-1900",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-383906"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-23T20:48:05.345000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Vulnerabilities\u00a0in\u00a0the\u00a0ODA\u00a0Drawings\u00a0Software\u00a0Development\u00a0Kit Siemens Siemens\u00a0Security\u00a0Advisory",
"trust": 0.8,
"url": "https://www.opendesign.com/security-advisories"
},
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"title": "Open Design Alliance Drawings SDK Fixes for code issue vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139574"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-219"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002748"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1315"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-843",
"trust": 1.1
},
{
"problemtype": "Wrong type (CWE-843) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-383906"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002748"
},
{
"db": "NVD",
"id": "CVE-2021-25177"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.5,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-219/"
},
{
"trust": 1.7,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf"
},
{
"trust": 1.7,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"trust": 1.7,
"url": "https://www.opendesign.com/security-advisories"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-25177"
},
{
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-047-01"
},
{
"trust": 1.3,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu92291213/index.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.1047"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0577"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2022031102"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-069-06"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-219"
},
{
"db": "VULHUB",
"id": "VHN-383906"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002748"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1315"
},
{
"db": "NVD",
"id": "CVE-2021-25177"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-219",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-383906",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002748",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1315",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2021-25177",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-219",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "VULHUB",
"id": "VHN-383906",
"ident": null
},
{
"date": "2021-09-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-002748",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-1315",
"ident": null
},
{
"date": "2021-01-18T08:15:13.273000",
"db": "NVD",
"id": "CVE-2021-25177",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-219",
"ident": null
},
{
"date": "2022-04-08T00:00:00",
"db": "VULHUB",
"id": "VHN-383906",
"ident": null
},
{
"date": "2021-09-29T08:27:00",
"db": "JVNDB",
"id": "JVNDB-2021-002748",
"ident": null
},
{
"date": "2022-03-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-1315",
"ident": null
},
{
"date": "2024-11-21T05:54:30.510000",
"db": "NVD",
"id": "CVE-2021-25177",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-1315"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Open\u00a0Design\u00a0Alliance\u00a0Drawings\u00a0SDK\u00a0 Vulnerability regarding mistyping in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-002748"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "code problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-1315"
}
],
"trust": 0.6
}
}
VAR-202101-1901
Vulnerability from variot - Updated: 2024-11-23 20:40An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A stack-based buffer overflow vulnerability exists when the recover operation is run with malformed .DXF and .DWG files. This can allow attackers to cause a crash potentially enabling a denial of service attack (Crash, Exit, or Restart) or possible code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF and DWG files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. The development kit accesses the data in .dwg and .dgn through a convenient, object-oriented API, and provides functions such as C++ API, support for repairing files, and support for .NET, JAVA, and Python development languages
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 2.1,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "drawings software development kit",
"scope": "lt",
"trust": 1.0,
"vendor": "opendesign",
"version": "2021.11"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "comos",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "10.4.1"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "drawings sdk",
"scope": null,
"trust": 0.8,
"vendor": "open design alliance",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-243"
},
{
"db": "ZDI",
"id": "ZDI-21-240"
},
{
"db": "ZDI",
"id": "ZDI-21-220"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002749"
},
{
"db": "NVD",
"id": "CVE-2021-25178"
}
]
},
"credits": {
"_id": null,
"data": "Francis Provencher {PRL}",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-243"
},
{
"db": "ZDI",
"id": "ZDI-21-240"
}
],
"trust": 1.4
},
"cve": "CVE-2021-25178",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2021-25178",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-383907",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-25178",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-25178",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2021-25178",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"exploitabilityScore": 1.8,
"id": "CVE-2021-25178",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2021-25178",
"trust": 1.4,
"value": "HIGH"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2021-25178",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2021-25178",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2021-25178",
"trust": 0.7,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-1314",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-383907",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2021-25178",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-243"
},
{
"db": "ZDI",
"id": "ZDI-21-240"
},
{
"db": "ZDI",
"id": "ZDI-21-220"
},
{
"db": "VULHUB",
"id": "VHN-383907"
},
{
"db": "VULMON",
"id": "CVE-2021-25178"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002749"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1314"
},
{
"db": "NVD",
"id": "CVE-2021-25178"
}
]
},
"description": {
"_id": null,
"data": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A stack-based buffer overflow vulnerability exists when the recover operation is run with malformed .DXF and .DWG files. This can allow attackers to cause a crash potentially enabling a denial of service attack (Crash, Exit, or Restart) or possible code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF and DWG files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. The development kit accesses the data in .dwg and .dgn through a convenient, object-oriented API, and provides functions such as C++ API, support for repairing files, and support for .NET, JAVA, and Python development languages",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-25178"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002749"
},
{
"db": "ZDI",
"id": "ZDI-21-243"
},
{
"db": "ZDI",
"id": "ZDI-21-240"
},
{
"db": "ZDI",
"id": "ZDI-21-220"
},
{
"db": "VULHUB",
"id": "VHN-383907"
},
{
"db": "VULMON",
"id": "CVE-2021-25178"
}
],
"trust": 3.69
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2021-25178",
"trust": 4.7
},
{
"db": "ZDI",
"id": "ZDI-21-243",
"trust": 3.3
},
{
"db": "ZDI",
"id": "ZDI-21-240",
"trust": 3.3
},
{
"db": "ZDI",
"id": "ZDI-21-220",
"trust": 3.3
},
{
"db": "SIEMENS",
"id": "SSA-663999",
"trust": 1.8
},
{
"db": "SIEMENS",
"id": "SSA-155599",
"trust": 1.7
},
{
"db": "ICS CERT",
"id": "ICSA-21-047-01",
"trust": 1.4
},
{
"db": "JVN",
"id": "JVNVU92291213",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002749",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-12166",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-12165",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11901",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1314",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2022.1047",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0577",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2022031102",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-22-069-06",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-040-06",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-383907",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2021-25178",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-243"
},
{
"db": "ZDI",
"id": "ZDI-21-240"
},
{
"db": "ZDI",
"id": "ZDI-21-220"
},
{
"db": "VULHUB",
"id": "VHN-383907"
},
{
"db": "VULMON",
"id": "CVE-2021-25178"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002749"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1314"
},
{
"db": "NVD",
"id": "CVE-2021-25178"
}
]
},
"id": "VAR-202101-1901",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-383907"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-23T20:40:42.378000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 2.1,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"title": "Vulnerabilities\u00a0in\u00a0the\u00a0ODA\u00a0Drawings\u00a0Software\u00a0Development\u00a0Kit Siemens Siemens\u00a0Security\u00a0Advisory",
"trust": 0.8,
"url": "https://www.opendesign.com/security-advisories"
},
{
"title": "Open Design Alliance Drawings SDK Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139573"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1c3bdb36e22f42f5b9339f0ff806382c"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-243"
},
{
"db": "ZDI",
"id": "ZDI-21-240"
},
{
"db": "ZDI",
"id": "ZDI-21-220"
},
{
"db": "VULMON",
"id": "CVE-2021-25178"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002749"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1314"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-383907"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002749"
},
{
"db": "NVD",
"id": "CVE-2021-25178"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"trust": 2.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-243/"
},
{
"trust": 2.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-220/"
},
{
"trust": 2.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-240/"
},
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"trust": 1.8,
"url": "https://www.opendesign.com/security-advisories"
},
{
"trust": 1.7,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-25178"
},
{
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-047-01"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu92291213/index.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.1047"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0577"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2022031102"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-069-06"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/787.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-243"
},
{
"db": "ZDI",
"id": "ZDI-21-240"
},
{
"db": "ZDI",
"id": "ZDI-21-220"
},
{
"db": "VULHUB",
"id": "VHN-383907"
},
{
"db": "VULMON",
"id": "CVE-2021-25178"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002749"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1314"
},
{
"db": "NVD",
"id": "CVE-2021-25178"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-243",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-240",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-220",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-383907",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2021-25178",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002749",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1314",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2021-25178",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-243",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-240",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-220",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "VULHUB",
"id": "VHN-383907",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "VULMON",
"id": "CVE-2021-25178",
"ident": null
},
{
"date": "2021-09-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-002749",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-1314",
"ident": null
},
{
"date": "2021-01-18T08:15:13.337000",
"db": "NVD",
"id": "CVE-2021-25178",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-243",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-240",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-220",
"ident": null
},
{
"date": "2022-04-08T00:00:00",
"db": "VULHUB",
"id": "VHN-383907",
"ident": null
},
{
"date": "2021-03-04T00:00:00",
"db": "VULMON",
"id": "CVE-2021-25178",
"ident": null
},
{
"date": "2021-09-29T08:27:00",
"db": "JVNDB",
"id": "JVNDB-2021-002749",
"ident": null
},
{
"date": "2022-03-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-1314",
"ident": null
},
{
"date": "2024-11-21T05:54:30.673000",
"db": "NVD",
"id": "CVE-2021-25178",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-1314"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Open\u00a0Design\u00a0Alliance\u00a0Drawings\u00a0SDK\u00a0 Out-of-bounds Vulnerability in Microsoft",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-002749"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-1314"
}
],
"trust": 0.6
}
}
VAR-202101-1898
Vulnerability from variot - Updated: 2024-11-23 20:27An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Conversion issue exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). Open Design Alliance Drawings SDK Exists in a vulnerability related to illegal type conversion.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. The development kit accesses the data in .dwg and .dgn through a convenient, object-oriented API, and provides functions such as C++ API, support for repairing files, and support for .NET, JAVA, and Python development languages
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 4.2,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "drawings software development kit",
"scope": "lt",
"trust": 1.0,
"vendor": "opendesign",
"version": "2021.11"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "comos",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "10.4.1"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "drawings sdk",
"scope": null,
"trust": 0.8,
"vendor": "open design alliance",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-246"
},
{
"db": "ZDI",
"id": "ZDI-21-245"
},
{
"db": "ZDI",
"id": "ZDI-21-244"
},
{
"db": "ZDI",
"id": "ZDI-21-224"
},
{
"db": "ZDI",
"id": "ZDI-21-223"
},
{
"db": "ZDI",
"id": "ZDI-21-218"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002746"
},
{
"db": "NVD",
"id": "CVE-2021-25175"
}
]
},
"credits": {
"_id": null,
"data": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-246"
},
{
"db": "ZDI",
"id": "ZDI-21-245"
},
{
"db": "ZDI",
"id": "ZDI-21-244"
},
{
"db": "ZDI",
"id": "ZDI-21-218"
}
],
"trust": 2.8
},
"cve": "CVE-2021-25175",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2021-25175",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-383904",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-25175",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 4.2,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-25175",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2021-25175",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2021-25175",
"trust": 4.2,
"value": "HIGH"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2021-25175",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2021-25175",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-1317",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-383904",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2021-25175",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-246"
},
{
"db": "ZDI",
"id": "ZDI-21-245"
},
{
"db": "ZDI",
"id": "ZDI-21-244"
},
{
"db": "ZDI",
"id": "ZDI-21-224"
},
{
"db": "ZDI",
"id": "ZDI-21-223"
},
{
"db": "ZDI",
"id": "ZDI-21-218"
},
{
"db": "VULHUB",
"id": "VHN-383904"
},
{
"db": "VULMON",
"id": "CVE-2021-25175"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002746"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1317"
},
{
"db": "NVD",
"id": "CVE-2021-25175"
}
]
},
"description": {
"_id": null,
"data": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Conversion issue exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). Open Design Alliance Drawings SDK Exists in a vulnerability related to illegal type conversion.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. The development kit accesses the data in .dwg and .dgn through a convenient, object-oriented API, and provides functions such as C++ API, support for repairing files, and support for .NET, JAVA, and Python development languages",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-25175"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002746"
},
{
"db": "ZDI",
"id": "ZDI-21-246"
},
{
"db": "ZDI",
"id": "ZDI-21-245"
},
{
"db": "ZDI",
"id": "ZDI-21-244"
},
{
"db": "ZDI",
"id": "ZDI-21-224"
},
{
"db": "ZDI",
"id": "ZDI-21-223"
},
{
"db": "ZDI",
"id": "ZDI-21-218"
},
{
"db": "VULHUB",
"id": "VHN-383904"
},
{
"db": "VULMON",
"id": "CVE-2021-25175"
}
],
"trust": 5.58
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2021-25175",
"trust": 6.8
},
{
"db": "ZDI",
"id": "ZDI-21-246",
"trust": 3.3
},
{
"db": "ZDI",
"id": "ZDI-21-245",
"trust": 3.3
},
{
"db": "ZDI",
"id": "ZDI-21-244",
"trust": 3.3
},
{
"db": "ZDI",
"id": "ZDI-21-224",
"trust": 3.3
},
{
"db": "ZDI",
"id": "ZDI-21-223",
"trust": 3.3
},
{
"db": "ZDI",
"id": "ZDI-21-218",
"trust": 3.3
},
{
"db": "SIEMENS",
"id": "SSA-155599",
"trust": 1.8
},
{
"db": "SIEMENS",
"id": "SSA-663999",
"trust": 1.8
},
{
"db": "ICS CERT",
"id": "ICSA-21-047-01",
"trust": 1.4
},
{
"db": "JVN",
"id": "JVNVU92291213",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002746",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11911",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11910",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11914",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11988",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11993",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11912",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1317",
"trust": 0.7
},
{
"db": "ICS CERT",
"id": "ICSA-22-069-06",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2022.1047",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0577",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2022031102",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-040-06",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-383904",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2021-25175",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-246"
},
{
"db": "ZDI",
"id": "ZDI-21-245"
},
{
"db": "ZDI",
"id": "ZDI-21-244"
},
{
"db": "ZDI",
"id": "ZDI-21-224"
},
{
"db": "ZDI",
"id": "ZDI-21-223"
},
{
"db": "ZDI",
"id": "ZDI-21-218"
},
{
"db": "VULHUB",
"id": "VHN-383904"
},
{
"db": "VULMON",
"id": "CVE-2021-25175"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002746"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1317"
},
{
"db": "NVD",
"id": "CVE-2021-25175"
}
]
},
"id": "VAR-202101-1898",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-383904"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-23T20:27:40.022000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 4.2,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"title": "Vulnerabilities\u00a0in\u00a0the\u00a0ODA\u00a0Drawings\u00a0Software\u00a0Development\u00a0Kit Siemens Siemens\u00a0Security\u00a0Advisory",
"trust": 0.8,
"url": "https://www.opendesign.com/security-advisories"
},
{
"title": "Open Design Alliance Drawings SDK Fixes for code issue vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139576"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=dce38d2a1ec28e091a143e851596b2e8"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1c3bdb36e22f42f5b9339f0ff806382c"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-246"
},
{
"db": "ZDI",
"id": "ZDI-21-245"
},
{
"db": "ZDI",
"id": "ZDI-21-244"
},
{
"db": "ZDI",
"id": "ZDI-21-224"
},
{
"db": "ZDI",
"id": "ZDI-21-223"
},
{
"db": "ZDI",
"id": "ZDI-21-218"
},
{
"db": "VULMON",
"id": "CVE-2021-25175"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002746"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1317"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-704",
"trust": 1.1
},
{
"problemtype": "Illegal type conversion or cast (CWE-704) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-383904"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002746"
},
{
"db": "NVD",
"id": "CVE-2021-25175"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 4.8,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"trust": 2.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-223/"
},
{
"trust": 2.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-218/"
},
{
"trust": 2.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-224/"
},
{
"trust": 2.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-244/"
},
{
"trust": 2.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-245/"
},
{
"trust": 2.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-246/"
},
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf"
},
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"trust": 1.8,
"url": "https://www.opendesign.com/security-advisories"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-25175"
},
{
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-047-01"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu92291213/index.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.1047"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0577"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2022031102"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-069-06"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/704.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-069-06"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-246"
},
{
"db": "ZDI",
"id": "ZDI-21-245"
},
{
"db": "ZDI",
"id": "ZDI-21-244"
},
{
"db": "ZDI",
"id": "ZDI-21-224"
},
{
"db": "ZDI",
"id": "ZDI-21-223"
},
{
"db": "ZDI",
"id": "ZDI-21-218"
},
{
"db": "VULHUB",
"id": "VHN-383904"
},
{
"db": "VULMON",
"id": "CVE-2021-25175"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002746"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1317"
},
{
"db": "NVD",
"id": "CVE-2021-25175"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-246",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-245",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-244",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-224",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-223",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-218",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-383904",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2021-25175",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002746",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1317",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2021-25175",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-246",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-245",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-244",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-224",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-223",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-218",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "VULHUB",
"id": "VHN-383904",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "VULMON",
"id": "CVE-2021-25175",
"ident": null
},
{
"date": "2021-09-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-002746",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-1317",
"ident": null
},
{
"date": "2021-01-18T08:15:13.180000",
"db": "NVD",
"id": "CVE-2021-25175",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-246",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-245",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-244",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-224",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-223",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-218",
"ident": null
},
{
"date": "2022-04-08T00:00:00",
"db": "VULHUB",
"id": "VHN-383904",
"ident": null
},
{
"date": "2022-04-08T00:00:00",
"db": "VULMON",
"id": "CVE-2021-25175",
"ident": null
},
{
"date": "2021-09-29T08:26:00",
"db": "JVNDB",
"id": "JVNDB-2021-002746",
"ident": null
},
{
"date": "2022-03-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-1317",
"ident": null
},
{
"date": "2024-11-21T05:54:30.173000",
"db": "NVD",
"id": "CVE-2021-25175",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-1317"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Siemens JT2Go DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-246"
},
{
"db": "ZDI",
"id": "ZDI-21-245"
},
{
"db": "ZDI",
"id": "ZDI-21-244"
}
],
"trust": 2.1
},
"type": {
"_id": null,
"data": "code problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-1317"
}
],
"trust": 0.6
}
}
VAR-202101-1899
Vulnerability from variot - Updated: 2024-11-23 20:22An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A NULL pointer dereference exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). Open Design Alliance Drawings SDK Has NULL A pointer dereference vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. The development kit accesses the data in .dwg and .dgn through a convenient, object-oriented API, and provides functions such as C++ API, support for repairing files, and support for .NET, JAVA, and Python development languages
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 1.4,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "drawings software development kit",
"scope": "lt",
"trust": 1.0,
"vendor": "opendesign",
"version": "2021.11"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "comos",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "10.4.1"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "drawings sdk",
"scope": null,
"trust": 0.8,
"vendor": "open design alliance",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-222"
},
{
"db": "ZDI",
"id": "ZDI-21-221"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002747"
},
{
"db": "NVD",
"id": "CVE-2021-25176"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-222"
}
],
"trust": 0.7
},
"cve": "CVE-2021-25176",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2021-25176",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-383905",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-25176",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-25176",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2021-25176",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2021-25176",
"trust": 1.4,
"value": "HIGH"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2021-25176",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2021-25176",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-1316",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-383905",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2021-25176",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-222"
},
{
"db": "ZDI",
"id": "ZDI-21-221"
},
{
"db": "VULHUB",
"id": "VHN-383905"
},
{
"db": "VULMON",
"id": "CVE-2021-25176"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002747"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1316"
},
{
"db": "NVD",
"id": "CVE-2021-25176"
}
]
},
"description": {
"_id": null,
"data": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A NULL pointer dereference exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). Open Design Alliance Drawings SDK Has NULL A pointer dereference vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. The development kit accesses the data in .dwg and .dgn through a convenient, object-oriented API, and provides functions such as C++ API, support for repairing files, and support for .NET, JAVA, and Python development languages",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-25176"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002747"
},
{
"db": "ZDI",
"id": "ZDI-21-222"
},
{
"db": "ZDI",
"id": "ZDI-21-221"
},
{
"db": "VULHUB",
"id": "VHN-383905"
},
{
"db": "VULMON",
"id": "CVE-2021-25176"
}
],
"trust": 3.06
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2021-25176",
"trust": 4.0
},
{
"db": "ZDI",
"id": "ZDI-21-222",
"trust": 3.3
},
{
"db": "ZDI",
"id": "ZDI-21-221",
"trust": 3.3
},
{
"db": "SIEMENS",
"id": "SSA-663999",
"trust": 1.8
},
{
"db": "SIEMENS",
"id": "SSA-155599",
"trust": 1.7
},
{
"db": "ICS CERT",
"id": "ICSA-21-047-01",
"trust": 1.4
},
{
"db": "JVN",
"id": "JVNVU92291213",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002747",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11989",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11913",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1316",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2022.1047",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0577",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-040-06",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-22-069-06",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2022031102",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-383905",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2021-25176",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-222"
},
{
"db": "ZDI",
"id": "ZDI-21-221"
},
{
"db": "VULHUB",
"id": "VHN-383905"
},
{
"db": "VULMON",
"id": "CVE-2021-25176"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002747"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1316"
},
{
"db": "NVD",
"id": "CVE-2021-25176"
}
]
},
"id": "VAR-202101-1899",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-383905"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-23T20:22:22.687000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"title": "Vulnerabilities\u00a0in\u00a0the\u00a0ODA\u00a0Drawings\u00a0Software\u00a0Development\u00a0Kit Siemens Siemens\u00a0Security\u00a0Advisory",
"trust": 0.8,
"url": "https://www.opendesign.com/security-advisories"
},
{
"title": "Open Design Alliance Drawings SDK Fixes for code issue vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139575"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1c3bdb36e22f42f5b9339f0ff806382c"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-222"
},
{
"db": "ZDI",
"id": "ZDI-21-221"
},
{
"db": "VULMON",
"id": "CVE-2021-25176"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002747"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1316"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-476",
"trust": 1.1
},
{
"problemtype": "NULL Pointer dereference (CWE-476) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-383905"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002747"
},
{
"db": "NVD",
"id": "CVE-2021-25176"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-222/"
},
{
"trust": 2.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-221/"
},
{
"trust": 2.0,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"trust": 1.8,
"url": "https://www.opendesign.com/security-advisories"
},
{
"trust": 1.7,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-25176"
},
{
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-047-01"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu92291213/index.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.1047"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0577"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2022031102"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-069-06"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/476.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-222"
},
{
"db": "ZDI",
"id": "ZDI-21-221"
},
{
"db": "VULHUB",
"id": "VHN-383905"
},
{
"db": "VULMON",
"id": "CVE-2021-25176"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002747"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1316"
},
{
"db": "NVD",
"id": "CVE-2021-25176"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-222",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-221",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-383905",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2021-25176",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2021-002747",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-1316",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2021-25176",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-222",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-221",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "VULHUB",
"id": "VHN-383905",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "VULMON",
"id": "CVE-2021-25176",
"ident": null
},
{
"date": "2021-09-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-002747",
"ident": null
},
{
"date": "2021-01-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-1316",
"ident": null
},
{
"date": "2021-01-18T08:15:13.227000",
"db": "NVD",
"id": "CVE-2021-25176",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-222",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-221",
"ident": null
},
{
"date": "2022-04-08T00:00:00",
"db": "VULHUB",
"id": "VHN-383905",
"ident": null
},
{
"date": "2021-03-04T00:00:00",
"db": "VULMON",
"id": "CVE-2021-25176",
"ident": null
},
{
"date": "2021-09-29T08:26:00",
"db": "JVNDB",
"id": "JVNDB-2021-002747",
"ident": null
},
{
"date": "2022-03-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-1316",
"ident": null
},
{
"date": "2024-11-21T05:54:30.343000",
"db": "NVD",
"id": "CVE-2021-25176",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-1316"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Siemens JT2Go DXF File Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-222"
},
{
"db": "ZDI",
"id": "ZDI-21-221"
}
],
"trust": 1.4
},
"type": {
"_id": null,
"data": "code problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-1316"
}
],
"trust": 0.6
}
}
VAR-202101-0351
Vulnerability from variot - Updated: 2024-11-23 20:16A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing ASM files. A crafted ASM file could trigger a type confusion condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11897). JT2Go and Teamcenter Visualization Exists in a mistyped vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-11897 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of ASM files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,
VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-055"
},
{
"db": "CNVD",
"id": "CNVD-2021-02581"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015254"
},
{
"db": "NVD",
"id": "CVE-2020-26990"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-055"
}
],
"trust": 0.7
},
"cve": "CVE-2020-26990",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26990",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02581",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-26990",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26990",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26990",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26990",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-26990",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-26990",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2021-02581",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-847",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-055"
},
{
"db": "CNVD",
"id": "CNVD-2021-02581"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015254"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-847"
},
{
"db": "NVD",
"id": "CVE-2020-26990"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing ASM files. A crafted ASM file could trigger a type confusion condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11897). JT2Go and Teamcenter Visualization Exists in a mistyped vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-11897 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of ASM files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,\r\n\r\nVFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26990"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015254"
},
{
"db": "ZDI",
"id": "ZDI-21-055"
},
{
"db": "CNVD",
"id": "CNVD-2021-02581"
}
],
"trust": 2.79
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-26990",
"trust": 3.7
},
{
"db": "ZDI",
"id": "ZDI-21-055",
"trust": 3.1
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "SIEMENS",
"id": "SSA-663999",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015254",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11897",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-02581",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-040-06",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0495",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-847",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-055"
},
{
"db": "CNVD",
"id": "CNVD-2021-02581"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015254"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-847"
},
{
"db": "NVD",
"id": "CVE-2020-26990"
}
]
},
"id": "VAR-202101-0351",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02581"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02581"
}
]
},
"last_update_date": "2024-11-23T20:16:35.387000Z",
"patch": {
"_id": null,
"data": [
{
"title": "SSA-622830 Siemens\u00a0Security\u00a0Advisory",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"title": "Patch for JT2Go and Teamcenter Visualization incompatible type access resource vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/243979"
},
{
"title": "Siemens Jt2go and Siemens Teamcenter Visualization Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139358"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-055"
},
{
"db": "CNVD",
"id": "CNVD-2021-02581"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015254"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-847"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-843",
"trust": 1.0
},
{
"problemtype": "Wrong type (CWE-843) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015254"
},
{
"db": "NVD",
"id": "CVE-2020-26990"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-055/"
},
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.6,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26990"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0495"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-055"
},
{
"db": "CNVD",
"id": "CNVD-2021-02581"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015254"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-847"
},
{
"db": "NVD",
"id": "CVE-2020-26990"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-055",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2021-02581",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015254",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-847",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-26990",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-055",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02581",
"ident": null
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015254",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-847",
"ident": null
},
{
"date": "2021-01-12T21:15:17.260000",
"db": "NVD",
"id": "CVE-2020-26990",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-055",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02581",
"ident": null
},
{
"date": "2021-09-15T08:31:00",
"db": "JVNDB",
"id": "JVNDB-2020-015254",
"ident": null
},
{
"date": "2021-05-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-847",
"ident": null
},
{
"date": "2024-11-21T05:20:38.333000",
"db": "NVD",
"id": "CVE-2020-26990",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-847"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "JT2Go\u00a0 and \u00a0Teamcenter\u00a0Visualization\u00a0 Vulnerability regarding mistyping in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015254"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-847"
}
],
"trust": 0.6
}
}
VAR-202102-0327
Vulnerability from variot - Updated: 2024-11-23 20:13A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PCT files. This could result in a memory corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12182). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-12182 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PCT files. The Tenda AC18 is a router from the Chinese company Tenda
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "ac18",
"scope": "eq",
"trust": 0.6,
"vendor": "tenda",
"version": "v15.03.05.05"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-232"
},
{
"db": "CNVD",
"id": "CNVD-2022-75821"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015914"
},
{
"db": "NVD",
"id": "CVE-2020-27006"
}
]
},
"credits": {
"_id": null,
"data": "Francis Provencher {PRL}",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-232"
}
],
"trust": 0.7
},
"cve": "CVE-2020-27006",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2020-27006",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2022-75821",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-27006",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-27006",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-27006",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-27006",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-27006",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-27006",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2022-75821",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202102-864",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-232"
},
{
"db": "CNVD",
"id": "CNVD-2022-75821"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015914"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-864"
},
{
"db": "NVD",
"id": "CVE-2020-27006"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PCT files. This could result in a memory corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12182). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-12182 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PCT files. The Tenda AC18 is a router from the Chinese company Tenda",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-27006"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015914"
},
{
"db": "ZDI",
"id": "ZDI-21-232"
},
{
"db": "CNVD",
"id": "CNVD-2022-75821"
}
],
"trust": 2.79
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-27006",
"trust": 3.7
},
{
"db": "ZDI",
"id": "ZDI-21-232",
"trust": 3.1
},
{
"db": "SIEMENS",
"id": "SSA-663999",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVNVU91083521",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015914",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-12182",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2022-75821",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-040-06",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0495",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202102-864",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-232"
},
{
"db": "CNVD",
"id": "CNVD-2022-75821"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015914"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-864"
},
{
"db": "NVD",
"id": "CVE-2020-27006"
}
]
},
"id": "VAR-202102-0327",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-75821"
}
],
"trust": 1.00125
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-75821"
}
]
},
"last_update_date": "2024-11-23T20:13:55.452000Z",
"patch": {
"_id": null,
"data": [
{
"title": "SSA-663999",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"title": "JT2Go Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=141286"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-232"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015914"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-864"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-119",
"trust": 1.0
},
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015914"
},
{
"db": "NVD",
"id": "CVE-2020-27006"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-232/"
},
{
"trust": 1.6,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-27006"
},
{
"trust": 1.3,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91083521/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0495"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-232"
},
{
"db": "CNVD",
"id": "CNVD-2022-75821"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015914"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-864"
},
{
"db": "NVD",
"id": "CVE-2020-27006"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-232",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2022-75821",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015914",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202102-864",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-27006",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-232",
"ident": null
},
{
"date": "2022-11-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-75821",
"ident": null
},
{
"date": "2021-10-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015914",
"ident": null
},
{
"date": "2021-02-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-864",
"ident": null
},
{
"date": "2021-02-09T17:15:14.343000",
"db": "NVD",
"id": "CVE-2020-27006",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-232",
"ident": null
},
{
"date": "2022-11-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-75821",
"ident": null
},
{
"date": "2021-10-22T08:12:00",
"db": "JVNDB",
"id": "JVNDB-2020-015914",
"ident": null
},
{
"date": "2021-10-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-864",
"ident": null
},
{
"date": "2024-11-21T05:20:40.170000",
"db": "NVD",
"id": "CVE-2020-27006",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-864"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "JT2Go\u00a0 and \u00a0Teamcenter\u00a0Visualization\u00a0 Out-of-bounds Vulnerability in Microsoft",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015914"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-864"
}
],
"trust": 0.6
}
}
VAR-202101-0388
Vulnerability from variot - Updated: 2024-11-23 20:11A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of SGI and RGB files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11992). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-11992 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SGI and RGB files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT, VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment.
JT2Go and Teamcenter Visualization has an unspecified vulnerability
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 2.1,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-242"
},
{
"db": "ZDI",
"id": "ZDI-21-241"
},
{
"db": "ZDI",
"id": "ZDI-21-060"
},
{
"db": "CNVD",
"id": "CNVD-2021-02576"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015259"
},
{
"db": "NVD",
"id": "CVE-2020-26995"
}
]
},
"credits": {
"_id": null,
"data": "Francis Provencher {PRL}",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-242"
},
{
"db": "ZDI",
"id": "ZDI-21-241"
}
],
"trust": 1.4
},
"cve": "CVE-2020-26995",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26995",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02576",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26995",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-26995",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26995",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26995",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2020-26995",
"trust": 1.4,
"value": "HIGH"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26995",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-26995",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-26995",
"trust": 0.7,
"value": "LOW"
},
{
"author": "CNVD",
"id": "CNVD-2021-02576",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-839",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-242"
},
{
"db": "ZDI",
"id": "ZDI-21-241"
},
{
"db": "ZDI",
"id": "ZDI-21-060"
},
{
"db": "CNVD",
"id": "CNVD-2021-02576"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015259"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-839"
},
{
"db": "NVD",
"id": "CVE-2020-26995"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0), Teamcenter Visualization (All versions \u003c V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of SGI and RGB files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11992). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-11992 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SGI and RGB files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT, VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment. \n\r\n\r\nJT2Go and Teamcenter Visualization has an unspecified vulnerability",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26995"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015259"
},
{
"db": "ZDI",
"id": "ZDI-21-242"
},
{
"db": "ZDI",
"id": "ZDI-21-241"
},
{
"db": "ZDI",
"id": "ZDI-21-060"
},
{
"db": "CNVD",
"id": "CNVD-2021-02576"
}
],
"trust": 4.05
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-26995",
"trust": 5.1
},
{
"db": "ZDI",
"id": "ZDI-21-060",
"trust": 3.1
},
{
"db": "ZDI",
"id": "ZDI-21-242",
"trust": 2.3
},
{
"db": "ZDI",
"id": "ZDI-21-241",
"trust": 2.3
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015259",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-12176",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-12168",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11992",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-02576",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-839",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-242"
},
{
"db": "ZDI",
"id": "ZDI-21-241"
},
{
"db": "ZDI",
"id": "ZDI-21-060"
},
{
"db": "CNVD",
"id": "CNVD-2021-02576"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015259"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-839"
},
{
"db": "NVD",
"id": "CVE-2020-26995"
}
]
},
"id": "VAR-202101-0388",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02576"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02576"
}
]
},
"last_update_date": "2024-11-23T20:11:15.871000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"title": "SSA-622830",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"title": "Patch for Unspecified vulnerability exists in JT2Go and Teamcenter Visualization (CNVD-2021-02576)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/243964"
},
{
"title": "Siemens Jt2go and Siemens Teamcenter Visualization Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139352"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-242"
},
{
"db": "ZDI",
"id": "ZDI-21-241"
},
{
"db": "ZDI",
"id": "ZDI-21-060"
},
{
"db": "CNVD",
"id": "CNVD-2021-02576"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015259"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-839"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015259"
},
{
"db": "NVD",
"id": "CVE-2020-26995"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-060/"
},
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 2.0,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 1.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-241/"
},
{
"trust": 1.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-242/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26995"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-242"
},
{
"db": "ZDI",
"id": "ZDI-21-241"
},
{
"db": "ZDI",
"id": "ZDI-21-060"
},
{
"db": "CNVD",
"id": "CNVD-2021-02576"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015259"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-839"
},
{
"db": "NVD",
"id": "CVE-2020-26995"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-242",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-241",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-060",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2021-02576",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015259",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-839",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-26995",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-242",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-241",
"ident": null
},
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-060",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02576",
"ident": null
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015259",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-839",
"ident": null
},
{
"date": "2021-01-12T21:15:17.573000",
"db": "NVD",
"id": "CVE-2020-26995",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-242",
"ident": null
},
{
"date": "2021-02-24T00:00:00",
"db": "ZDI",
"id": "ZDI-21-241",
"ident": null
},
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-060",
"ident": null
},
{
"date": "2021-02-04T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02576",
"ident": null
},
{
"date": "2021-09-15T08:32:00",
"db": "JVNDB",
"id": "JVNDB-2020-015259",
"ident": null
},
{
"date": "2021-02-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-839",
"ident": null
},
{
"date": "2024-11-21T05:20:38.950000",
"db": "NVD",
"id": "CVE-2020-26995",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-839"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "JT2Go\u00a0 and \u00a0Teamcenter\u00a0Visualization\u00a0 Out-of-bounds Vulnerability in Microsoft",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015259"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-839"
}
],
"trust": 0.6
}
}
VAR-202101-0348
Vulnerability from variot - Updated: 2024-11-23 20:06A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of TGA files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12016, ZDI-CAN-12017). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-12016 and ZDI-CAN-12017 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of TGA files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,
VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 1.4,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0"
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-061"
},
{
"db": "ZDI",
"id": "ZDI-21-059"
},
{
"db": "CNVD",
"id": "CNVD-2021-02584"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015269"
},
{
"db": "NVD",
"id": "CVE-2020-26987"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-061"
},
{
"db": "ZDI",
"id": "ZDI-21-059"
}
],
"trust": 1.4
},
"cve": "CVE-2020-26987",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26987",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02584",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26987",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-26987",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26987",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2020-26987",
"trust": 1.4,
"value": "HIGH"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26987",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-26987",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-02584",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-849",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-061"
},
{
"db": "ZDI",
"id": "ZDI-21-059"
},
{
"db": "CNVD",
"id": "CNVD-2021-02584"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015269"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-849"
},
{
"db": "NVD",
"id": "CVE-2020-26987"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0), Teamcenter Visualization (All versions \u003c V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of TGA files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12016, ZDI-CAN-12017). JT2Go and Teamcenter Visualization Is vulnerable to an out-of-bounds write. Zero Day Initiative To this vulnerability ZDI-CAN-12016 and ZDI-CAN-12017 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of TGA files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,\r\n\r\nVFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26987"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015269"
},
{
"db": "ZDI",
"id": "ZDI-21-061"
},
{
"db": "ZDI",
"id": "ZDI-21-059"
},
{
"db": "CNVD",
"id": "CNVD-2021-02584"
}
],
"trust": 3.42
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-26987",
"trust": 4.4
},
{
"db": "ZDI",
"id": "ZDI-21-061",
"trust": 3.1
},
{
"db": "ZDI",
"id": "ZDI-21-059",
"trust": 3.1
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015269",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-12016",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-12017",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-02584",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-849",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-061"
},
{
"db": "ZDI",
"id": "ZDI-21-059"
},
{
"db": "CNVD",
"id": "CNVD-2021-02584"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015269"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-849"
},
{
"db": "NVD",
"id": "CVE-2020-26987"
}
]
},
"id": "VAR-202101-0348",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02584"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02584"
}
]
},
"last_update_date": "2024-11-23T20:06:44.232000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"title": "SSA-622830",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Patch for JT2Go and Teamcenter Visualization heap buffer overflow vulnerability (CNVD-2021-02584)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/243988"
},
{
"title": "Siemens Jt2go and Siemens Teamcenter Visualization Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139360"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-061"
},
{
"db": "ZDI",
"id": "ZDI-21-059"
},
{
"db": "CNVD",
"id": "CNVD-2021-02584"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015269"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-849"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-122",
"trust": 1.0
},
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015269"
},
{
"db": "NVD",
"id": "CVE-2020-26987"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-059/"
},
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-061/"
},
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26987"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-061"
},
{
"db": "ZDI",
"id": "ZDI-21-059"
},
{
"db": "CNVD",
"id": "CNVD-2021-02584"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015269"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-849"
},
{
"db": "NVD",
"id": "CVE-2020-26987"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-061",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-059",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2021-02584",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015269",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-849",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-26987",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-061",
"ident": null
},
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-059",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02584",
"ident": null
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015269",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-849",
"ident": null
},
{
"date": "2021-01-12T21:15:17.057000",
"db": "NVD",
"id": "CVE-2020-26987",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-061",
"ident": null
},
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-059",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02584",
"ident": null
},
{
"date": "2021-09-15T08:33:00",
"db": "JVNDB",
"id": "JVNDB-2020-015269",
"ident": null
},
{
"date": "2021-02-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-849",
"ident": null
},
{
"date": "2024-11-21T05:20:37.970000",
"db": "NVD",
"id": "CVE-2020-26987",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-849"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Siemens JT2Go TGA File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-061"
},
{
"db": "ZDI",
"id": "ZDI-21-059"
}
],
"trust": 1.4
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-849"
}
],
"trust": 0.6
}
}
VAR-202101-0484
Vulnerability from variot - Updated: 2024-11-23 20:01A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing PAR files. This can result in an out of bounds write past the memory location that is a read only image address. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11885). Several Siemens products are vulnerable to out-of-bounds writes. Zero Day Initiative To this vulnerability ZDI-CAN-11885 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT, VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment.
JT2Go and Teamcenter Visualization have security vulnerabilities
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "solid edge",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": "se2020"
},
{
"_id": null,
"model": "solid edge",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": "se2021"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "solid edge",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "solid edge viewer",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-073"
},
{
"db": "ZDI",
"id": "ZDI-21-047"
},
{
"db": "CNVD",
"id": "CNVD-2021-02574"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015261"
},
{
"db": "NVD",
"id": "CVE-2020-28383"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-073"
},
{
"db": "ZDI",
"id": "ZDI-21-047"
}
],
"trust": 1.4
},
"cve": "CVE-2020-28383",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-28383",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02574",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-28383",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-28383",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-28383",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2020-28383",
"trust": 1.4,
"value": "HIGH"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2020-28383",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-28383",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-02574",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-918",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-073"
},
{
"db": "ZDI",
"id": "ZDI-21-047"
},
{
"db": "CNVD",
"id": "CNVD-2021-02574"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015261"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-918"
},
{
"db": "NVD",
"id": "CVE-2020-28383"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Solid Edge SE2020 (All Versions \u003c SE2020MP12), Solid Edge SE2021 (All Versions \u003c SE2021MP2), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing PAR files. This can result in an out of bounds write past the memory location that is a read only image address. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11885). Several Siemens products are vulnerable to out-of-bounds writes. Zero Day Initiative To this vulnerability ZDI-CAN-11885 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT, VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment. \n\r\n\r\nJT2Go and Teamcenter Visualization have security vulnerabilities",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-28383"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015261"
},
{
"db": "ZDI",
"id": "ZDI-21-073"
},
{
"db": "ZDI",
"id": "ZDI-21-047"
},
{
"db": "CNVD",
"id": "CNVD-2021-02574"
}
],
"trust": 3.42
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-28383",
"trust": 4.4
},
{
"db": "ZDI",
"id": "ZDI-21-047",
"trust": 3.1
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-04",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-21-073",
"trust": 2.3
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "SIEMENS",
"id": "SSA-663999",
"trust": 1.6
},
{
"db": "SIEMENS",
"id": "SSA-979834",
"trust": 1.6
},
{
"db": "ZDI",
"id": "ZDI-21-054",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015261",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11921",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11885",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-02574",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-040-06",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-918",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-073"
},
{
"db": "ZDI",
"id": "ZDI-21-047"
},
{
"db": "CNVD",
"id": "CNVD-2021-02574"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015261"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-918"
},
{
"db": "NVD",
"id": "CVE-2020-28383"
}
]
},
"id": "VAR-202101-0484",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02574"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02574"
}
]
},
"last_update_date": "2024-11-23T20:01:36.955000Z",
"patch": {
"_id": null,
"data": [
{
"title": "",
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"title": "SSA-979834",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Patch for Unspecified vulnerability exists in JT2Go and Teamcenter Visualization (CNVD-2021-02574)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/243958"
},
{
"title": "Siemens Jt2go and Siemens Teamcenter Visualization Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139393"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-073"
},
{
"db": "ZDI",
"id": "ZDI-21-047"
},
{
"db": "CNVD",
"id": "CNVD-2021-02574"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015261"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-918"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015261"
},
{
"db": "NVD",
"id": "CVE-2020-28383"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-04"
},
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-047/"
},
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-073/"
},
{
"trust": 1.6,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"trust": 1.6,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"
},
{
"trust": 1.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-054/"
},
{
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-28383"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-073"
},
{
"db": "ZDI",
"id": "ZDI-21-047"
},
{
"db": "CNVD",
"id": "CNVD-2021-02574"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015261"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-918"
},
{
"db": "NVD",
"id": "CVE-2020-28383"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-073",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-047",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2021-02574",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015261",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-918",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-28383",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-01-19T00:00:00",
"db": "ZDI",
"id": "ZDI-21-073",
"ident": null
},
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-047",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02574",
"ident": null
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015261",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-918",
"ident": null
},
{
"date": "2021-01-12T21:15:17.853000",
"db": "NVD",
"id": "CVE-2020-28383",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-01-19T00:00:00",
"db": "ZDI",
"id": "ZDI-21-073",
"ident": null
},
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-047",
"ident": null
},
{
"date": "2021-02-04T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02574",
"ident": null
},
{
"date": "2021-09-15T08:32:00",
"db": "JVNDB",
"id": "JVNDB-2020-015261",
"ident": null
},
{
"date": "2021-05-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-918",
"ident": null
},
{
"date": "2024-11-21T05:22:41.487000",
"db": "NVD",
"id": "CVE-2020-28383",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-918"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Out-of-bounds write vulnerabilities in multiple Siemens products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015261"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-918"
}
],
"trust": 0.6
}
}
VAR-202101-0352
Vulnerability from variot - Updated: 2024-11-23 19:53A vulnerability has been identified in JT2Go (All versions < V13.1.0.2), Teamcenter Visualization (All versions < V13.1.0.2). Affected applications lack proper validation of user-supplied data when parsing ASM files. This could lead to pointer dereferences of a value obtained from untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11899). JT2Go and Teamcenter Visualization Has NULL A pointer dereference vulnerability exists. Zero Day Initiative To this vulnerability ZDI-CAN-11899 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of ASM files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT, VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.2"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.2"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0.2"
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-053"
},
{
"db": "CNVD",
"id": "CNVD-2021-02580"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015255"
},
{
"db": "NVD",
"id": "CVE-2020-26991"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-053"
}
],
"trust": 0.7
},
"cve": "CVE-2020-26991",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26991",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02580",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-26991",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26991",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26991",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26991",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-26991",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-26991",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2021-02580",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-844",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-26991",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-053"
},
{
"db": "CNVD",
"id": "CNVD-2021-02580"
},
{
"db": "VULMON",
"id": "CVE-2020-26991"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015255"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-844"
},
{
"db": "NVD",
"id": "CVE-2020-26991"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.2), Teamcenter Visualization (All versions \u003c V13.1.0.2). Affected applications lack proper validation of user-supplied data when parsing ASM files. This could lead to pointer dereferences of a value obtained from untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11899). JT2Go and Teamcenter Visualization Has NULL A pointer dereference vulnerability exists. Zero Day Initiative To this vulnerability ZDI-CAN-11899 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of ASM files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT, VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26991"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015255"
},
{
"db": "ZDI",
"id": "ZDI-21-053"
},
{
"db": "CNVD",
"id": "CNVD-2021-02580"
},
{
"db": "VULMON",
"id": "CVE-2020-26991"
}
],
"trust": 2.88
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-26991",
"trust": 3.8
},
{
"db": "ZDI",
"id": "ZDI-21-053",
"trust": 3.2
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.3
},
{
"db": "SIEMENS",
"id": "SSA-663999",
"trust": 1.7
},
{
"db": "SIEMENS",
"id": "SSA-695540",
"trust": 1.7
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015255",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11899",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-02580",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-040-06",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-147-04",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0495",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.1836",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-844",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2020-26991",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-053"
},
{
"db": "CNVD",
"id": "CNVD-2021-02580"
},
{
"db": "VULMON",
"id": "CVE-2020-26991"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015255"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-844"
},
{
"db": "NVD",
"id": "CVE-2020-26991"
}
]
},
"id": "VAR-202101-0352",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02580"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02580"
}
]
},
"last_update_date": "2024-11-23T19:53:31.825000Z",
"patch": {
"_id": null,
"data": [
{
"title": "SSA-695540",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": " https://us-cert.cisa.gov/ics/advisories/icsa-21-147-04",
"trust": 0.7,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-695540.pdf"
},
{
"title": "Patch for JT2Go and Teamcenter Visualization untrusted pointer vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/243976"
},
{
"title": "Siemens Jt2go and Siemens Teamcenter Visualization Fixes for code issue vulnerabilities",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=139356"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=22012358d4c381f4f14edecd2684a63a"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=c60b7733e9b4edbad6ce3fc7a4344fda"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=1c3bdb36e22f42f5b9339f0ff806382c"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-053"
},
{
"db": "CNVD",
"id": "CNVD-2021-02580"
},
{
"db": "VULMON",
"id": "CVE-2020-26991"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015255"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-844"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-822",
"trust": 1.0
},
{
"problemtype": "CWE-476",
"trust": 1.0
},
{
"problemtype": "NULL Pointer dereference (CWE-476) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015255"
},
{
"db": "NVD",
"id": "CVE-2020-26991"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-053/"
},
{
"trust": 2.4,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-695540.pdf"
},
{
"trust": 2.3,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.7,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26991"
},
{
"trust": 1.3,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-147-04"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0495"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.1836"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/476.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-053"
},
{
"db": "CNVD",
"id": "CNVD-2021-02580"
},
{
"db": "VULMON",
"id": "CVE-2020-26991"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015255"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-844"
},
{
"db": "NVD",
"id": "CVE-2020-26991"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-053",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2021-02580",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2020-26991",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015255",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-844",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-26991",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-01-15T00:00:00",
"db": "ZDI",
"id": "ZDI-21-053",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02580",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "VULMON",
"id": "CVE-2020-26991",
"ident": null
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015255",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-844",
"ident": null
},
{
"date": "2021-01-12T21:15:17.323000",
"db": "NVD",
"id": "CVE-2020-26991",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-06-08T00:00:00",
"db": "ZDI",
"id": "ZDI-21-053",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02580",
"ident": null
},
{
"date": "2021-05-19T00:00:00",
"db": "VULMON",
"id": "CVE-2020-26991",
"ident": null
},
{
"date": "2021-09-15T08:31:00",
"db": "JVNDB",
"id": "JVNDB-2020-015255",
"ident": null
},
{
"date": "2022-10-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-844",
"ident": null
},
{
"date": "2024-11-21T05:20:38.457000",
"db": "NVD",
"id": "CVE-2020-26991",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-844"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "JT2Go\u00a0 and \u00a0Teamcenter\u00a0Visualization\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015255"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "code problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-844"
}
],
"trust": 0.6
}
}