Vulnerability Details : CVE-2022-35171
When a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below
Vulnerability category: Input validation
Exploit prediction scoring system (EPSS) score for CVE-2022-35171
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 16 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-35171
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
nvd@nist.gov |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
nvd@nist.gov |
CWE ids for CVE-2022-35171
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: cna@sap.com (Primary)
References for CVE-2022-35171
-
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
SAP Patch Day BlogVendor Advisory
-
https://launchpad.support.sap.com/#/notes/3220746
SAP ONE Support Launchpad: Log OnPermissions Required;Vendor Advisory
Products affected by CVE-2022-35171
- cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*