cvelist/2024/24xxx/CVE-2024-24925.json

75 lines
2.5 KiB
JSON
Raw Normal View History

2024-02-01 16:00:33 +00:00
{
2024-02-13 10:00:33 +00:00
"data_version": "4.0",
2024-02-01 16:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-24925",
2024-02-13 10:00:33 +00:00
"ASSIGNER": "productcert@siemens.com",
"STATE": "PUBLIC"
2024-02-01 16:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-02-13 10:00:33 +00:00
"value": "A vulnerability has been identified in Simcenter Femap (All versions < V2306.0000). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted Catia MODEL files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-22060)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-824: Access of Uninitialized Pointer",
"cweId": "CWE-824"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "Simcenter Femap",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "V2306.0000"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-000072.html",
"refsource": "MISC",
"name": "https://cert-portal.siemens.com/productcert/html/ssa-000072.html"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"baseScore": 7.8,
"baseSeverity": "HIGH"
2024-02-01 16:00:33 +00:00
}
]
}
}