A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.13), Teamcenter V13.0 (All versions < V13.0.0.9), Teamcenter V13.1 (All versions), Teamcenter V13.2 (All versions < V13.2.0.8), Teamcenter V13.3 (All versions < V13.3.0.3), Teamcenter V14.0 (All versions < V14.0.0.2). The tcserver.exe binary in affected applications is vulnerable to a stack overflow condition during the parsing of user input that may lead the binary to crash.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-789162.pdf | Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
23 Feb 2023, 18:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:teamcenter:*:*:*:*:*:*:*:* |
10 Aug 2022, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.13), Teamcenter V13.0 (All versions < V13.0.0.9), Teamcenter V13.1 (All versions), Teamcenter V13.2 (All versions < V13.2.0.8), Teamcenter V13.3 (All versions < V13.3.0.3), Teamcenter V14.0 (All versions < V14.0.0.2). The tcserver.exe binary in affected applications is vulnerable to a stack overflow condition during the parsing of user input that may lead the binary to crash. | |
CWE | CWE-121 |
26 May 2022, 17:34
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-789162.pdf - Mitigation, Patch, Vendor Advisory | |
CWE | CWE-787 | |
CPE | cpe:2.3:a:siemens:teamcenter:14.0:*:*:*:*:*:*:* cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:* |
20 May 2022, 13:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-20 13:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-24290
Mitre link : CVE-2022-24290
CVE.ORG link : CVE-2022-24290
JSON object : View
Products Affected
siemens
- teamcenter