An information disclosure vulnerability has been identified in the Simcenter Femap V2022.1 (All versions V2022.1.3) software. This vulnerability could be exploited by an attacker to Bypass authentication and access sensitive information on the targeted system. (ZDI-CAN-17412) An information disclosure vulnerability has been identified in the Simcenter Femap V2022.2 (All versions V2022.2.2) software. This vulnerability could be exploited by an attacker to Bypass authentication and view sensitive information on the targeted system. (ZDI-CAN-17413) A denial of service vulnerability has been identified in the Simcenter Femap V2022.1 (All versions V2022.1.3) software. This vulnerability could be exploited by an attacker to cause a denial of service condition. (ZDI-CAN-17418) An information disclosure vulnerability has been identified in the Simcenter Femap V2022.2 (All versions V2022.2.2) software. This vulnerability could be exploited by an attacker to view sensitive information on the targeted system. (ZDI-CAN-17419) A vulnerability in the JTTK library has been identified in the Simcenter Femap V2022.1 (All versions V2022.1.3) software. The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker
Vulnerability overview
A vulnerability has been identified in the Simcenter Femap V2022 software. This vulnerability could be exploited by an attacker to bypass authentication and access sensitive information on the targeted system. An information disclosure vulnerability has been identified in the Simcenter Femap V2022 software. This vulnerability could be exploited by an attacker to view sensitive information on the targeted system. A denial of service vulnerability has been identified in the Simcenter Femap V2022 software. This vulnerability could be exploited by an attacker to cause a denial of service condition. An information disclosure vulnerability has been identified in the Simcenter Femap V2022 software. This vulnerability could be exploited by an attacker to view sensitive information on the targeted system.
Timeline
Published on: 10/11/2022 11:15:00 UTC
Last modified on: 10/12/2022 14:30:00 UTC