Vulnerability Description
A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of JT files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11972)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Jt2Go | < 13.1.0 |
| Siemens | Teamcenter Visualization | < 13.1.0 |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdfVendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-21-051/Third Party AdvisoryVDB Entry
- https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdfVendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-21-051/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2020-26984?
CVE-2020-26984 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsin...
How severe is CVE-2020-26984?
CVE-2020-26984 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-26984?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Jt2Go, Siemens Teamcenter Visualization.