Remote Code Execution Vulnerability in SAP 3D Visual Enterprise Author
CVE-2022-41170
7.8HIGH
Summary
A vulnerability has been identified in SAP 3D Visual Enterprise Author, specifically in version 9, where improper memory management can be exploited. If a user opens a specially crafted CATIA4 Part (.model) file from untrusted sources using the CatiaTranslator.exe, it may result in remote code execution. This occurs due to a stack-based overflow or the reuse of a dangling pointer, leading to memory being overwritten. Users are advised to ensure they use trusted files and keep their software up to date to mitigate potential threats.
Affected Version(s)
SAP 3D Visual Enterprise Author 9
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved