CVE-2020-26992Stack-based Buffer Overflow in Siemens Jt2go

Severity
7.8HIGHNVD
EPSS
0.9%
top 25.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 12
Latest updateMay 24

Description

A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing CGM files. This could lead to a stack based buffer overflow while trying to copy to a buffer during font string handling. An attacker could leverage this vulnerability to execute code in the context of the current process.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5siemens/teamcenter_visualizationAll versions < V13.1.0
NVDsiemens/jt2go< 13.1.0
CVEListV5siemens/jt2goAll versions < V13.1.0

🔴Vulnerability Details

2
GHSA
GHSA-2hqm-x8qp-68ph: A vulnerability has been identified in JT2Go (All Versions < V132022-05-24
CVEList
CVE-2020-26992: A vulnerability has been identified in JT2Go (All versions < V132021-01-12

📋Vendor Advisories

1
CISA ICS
Siemens JT2Go and Teamcenter Visualization (Update B)2021-02-09
CVE-2020-26992 — Stack-based Buffer Overflow in Siemens | cvebase