Remote Code Execution Vulnerability in SAP 3D Visual Enterprise Author
CVE-2022-39803

7.8HIGH

Key Information:

Vendor
SAP
Vendor
CVE Published:
11 October 2022

Summary

A vulnerability exists in SAP 3D Visual Enterprise Author, version 9, where improper memory management may lead to remote code execution. This occurs when a user opens a specially crafted ACIS Part and Assembly (.sat) file, potentially received from untrusted sources. The manipulation can cause a stack-based overflow or the reuse of a dangling pointer, which refers to overwritten memory. This vulnerability underscores the importance of cautious handling of files from unknown origins.

Affected Version(s)

SAP 3D Visual Enterprise Author 9

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.