A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application contains a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-20842)
                
            References
                    | Link | Resource | 
|---|---|
| https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf | Vendor Advisory | 
| https://cert-portal.siemens.com/productcert/pdf/ssa-478780.pdf | Vendor Advisory | 
| https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf | Vendor Advisory | 
| https://cert-portal.siemens.com/productcert/pdf/ssa-478780.pdf | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 08:12
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf - Vendor Advisory | |
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-478780.pdf - Vendor Advisory | 
25 Jan 2024, 02:23
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-09-12 10:15
Updated : 2024-11-21 08:12
NVD link : CVE-2023-38075
Mitre link : CVE-2023-38075
CVE.ORG link : CVE-2023-38075
JSON object : View
Products Affected
                siemens
- jt2go
- teamcenter_visualization
- tecnomatix_plant_simulation
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
