9.4

CVE-2024-1624

An OS Command Injection vulnerability affecting documentation server on 3DEXPERIENCE from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x, SIMULIA Abaqus from Release 2022 through Release 2024, SIMULIA Isight from Release 2022 through Release 2024 and CATIA Composer from Release R2023 through Release R2024. A specially crafted HTTP request can lead to arbitrary command execution.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendor3ds
Product 3dexperience
Default Statusunknown
Version <= r2022.fp.cfa.2406
Version r2022x_golden
Status affected
Version <= R2023x.FP.CFA.2350
Version r2023x_golden
Status affected
Version <= R2024x.FP.CFA.2405
Version r2024x_golden
Status affected
Vendor3ds
Product simulia_abaqus
Default Statusunknown
Version <= 2022.FP.CFA.2406
Version 2022_golden
Status affected
Version <= 2023.FP.CFA.2350
Version 2023_golden
Status affected
Version <= 2024.FP.CFA.2405
Version 2024_golden
Status affected
Vendor3ds
Product simulia_insight
Default Statusunknown
Version 2022_golden
Status affected
Version 2023_golden
Status affected
Version 2024_golden
Status affected
Vendor3ds
Product catia_composer
Default Statusunknown
Version <= R2023_Refresh4
Version r2023_golden
Status affected
Version <= R2023_Refresh3
Version r2024_golden
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.27% 0.498
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
3DS.Information-Security@3ds.com 9.4 3.9 5.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.