9.4
CVE-2024-1624
- EPSS 0.27%
- Published 01.03.2024 16:15:45
- Last modified 21.11.2024 08:50:56
- Source 3DS.Information-Security@3ds.c
- Teams watchlist Login
- Open Login
An OS Command Injection vulnerability affecting documentation server on 3DEXPERIENCE from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x, SIMULIA Abaqus from Release 2022 through Release 2024, SIMULIA Isight from Release 2022 through Release 2024 and CATIA Composer from Release R2023 through Release R2024. A specially crafted HTTP request can lead to arbitrary command execution.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendor3ds
≫
Product
3dexperience
Default Statusunknown
Version <=
r2022.fp.cfa.2406
Version
r2022x_golden
Status
affected
Version <=
R2023x.FP.CFA.2350
Version
r2023x_golden
Status
affected
Version <=
R2024x.FP.CFA.2405
Version
r2024x_golden
Status
affected
Vendor3ds
≫
Product
simulia_abaqus
Default Statusunknown
Version <=
2022.FP.CFA.2406
Version
2022_golden
Status
affected
Version <=
2023.FP.CFA.2350
Version
2023_golden
Status
affected
Version <=
2024.FP.CFA.2405
Version
2024_golden
Status
affected
Vendor3ds
≫
Product
simulia_insight
Default Statusunknown
Version
2022_golden
Status
affected
Version
2023_golden
Status
affected
Version
2024_golden
Status
affected
Vendor3ds
≫
Product
catia_composer
Default Statusunknown
Version <=
R2023_Refresh4
Version
r2023_golden
Status
affected
Version <=
R2023_Refresh3
Version
r2024_golden
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.27% | 0.498 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
3DS.Information-Security@3ds.com | 9.4 | 3.9 | 5.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.