Advisory
On 11.10.2022 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP 3D Visual Enterprise .
SAP Note 3245928 addresses "[Multiple CVEs] Multiple vulnerabilities in SAP 3D Visual Enterprise Viewer" to prevent code injection denial of service (dos) with a high risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
This SAP security note addresses several vulnerabilities identified in SAP 3D Visual Enterprise Viewer. SAP 3D Visual Enterprise Viewer does not properly validate inputs of certain file types allowing an unauthenticated user to open manipulated files received from untrusted sources resulting in the application to crash and becoming temporarily unavailable. The file format details along with their CVE relevant information can be found below: Arbitrary code execution: AutoCAD (.dwg, TeighaTranslator.exe) - CVE-2022-41189 AutoCAD (.dxf, TeighaTranslator.exe) - CVE-2022-41190 Computer Graphics Metafile (.cgm, CgmCore.dll) - CVE-2022-41186 Encapsulated Post Script (.eps, ai.x3d) - CVE-2022-41193 EAAmiga Interchange File Format (.iff, 2d.x3d) - CVE-2022-41195 Open Inventor File (.iv, vrml.x3d) - CVE-2022-41199 Jupiter Tesselation (.jt, JTReader.x3d) - CVE-2022-41191 Wavefront Object (.obj, ObjTranslator.exe) - CVE-2022-41187 Right Hemisphere Binary (.rh, rh.x3d) - CVE-2022-41201 SketchUp (.skp, SketchUp.x3d) - CVE-2022-41198 Scalable Vector Graphic (.svg, svg.x3d) - CVE-2022-41200 Visual Design Stream (.vds, vds.x3d) - CVE-2022-41202 VRML Worlds (.wrl, vrml.x3d) - CVE-2022-41196 Denial of service: VRML Worlds (.wrl, vrml.x3d) - CVE-2022-41197 Wavefront Object (.obj, ObjTranslator.exe) - CVE-2022-41188 Jupiter Tesselation (.jt, JTReader.x3d) - CVE-2022-41192 Encapsulated Post Script (.eps, ai.x3d) - CVE-2022-41194Solution
SAP 3D Visual Enterprise Viewer now properly validates the input files.