Remote Code Execution Vulnerability in SAP 3D Visual Enterprise Viewer
CVE-2022-41193
7.8HIGH
Summary
This vulnerability arises from improper memory management in SAP 3D Visual Enterprise Viewer, specifically when users open manipulated Encapsulated Post Script (.eps, .ai.x3d) files from untrusted sources. Attackers can exploit this flaw to trigger a remote code execution by manipulating stack-based overflow conditions or reusing a dangling pointer that references modified memory space, potentially allowing unauthorized actions within the affected system.
Affected Version(s)
SAP 3D Visual Enterprise Viewer 9
References
EPSS Score
15% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved