Remote Code Execution Vulnerability in SAP 3D Visual Enterprise Author
CVE-2022-39803
7.8HIGH
Summary
A vulnerability exists in SAP 3D Visual Enterprise Author, version 9, where improper memory management may lead to remote code execution. This occurs when a user opens a specially crafted ACIS Part and Assembly (.sat) file, potentially received from untrusted sources. The manipulation can cause a stack-based overflow or the reuse of a dangling pointer, which refers to overwritten memory. This vulnerability underscores the importance of cautious handling of files from unknown origins.
Affected Version(s)
SAP 3D Visual Enterprise Author 9
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved