Remote Code Execution Risk in SAP 3D Visual Enterprise Author Due to Memory Management Flaw
CVE-2022-41168

7.8HIGH

Key Information:

Vendor
SAP
Vendor
CVE Published:
11 October 2022

Summary

A vulnerability exists in SAP 3D Visual Enterprise Author, specifically in version 9, due to improper memory management. When users open a specially crafted CATIA5 Part (.catpart) file sourced from untrusted origins, it could lead to a Remote Code Execution scenario. This exploitation occurs through stack-based overflow or the reuse of dangling pointers, which manipulate overwritten memory spaces.

Affected Version(s)

SAP 3D Visual Enterprise Author 9

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.