CVE-2022-42268
13.01.2023, 06:15
Omniverse Kit contains a vulnerability in the reference applications Create, Audio2Face, Isaac Sim, View, Code, and Machinima. These applications allow executable Python code to be embedded in Universal Scene Description (USD) files to customize all aspects of a scene. If a user opens a USD file that contains embedded Python code in one of these applications, the embedded Python code automatically runs with the privileges of the user who opened the file. As a result, an unprivileged remote attacker could craft a USD file containing malicious Python code and persuade a local user to open the file, which may lead to information disclosure, data tampering, and denial of service.
Vendor | Product | Version |
---|---|---|
nvidia | nvidia_isaac_sim | 𝑥 < 2022.2.0 |
nvidia | omniverse_audio2face | 𝑥 < 2022.2 |
nvidia | omniverse_code | 𝑥 < 2022.3.0 |
nvidia | omniverse_create | 𝑥 < 2022.3 |
nvidia | omniverse_machinima | 𝑥 < 2022.3 |
nvidia | omniverse_view | 𝑥 < 2022.2.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
- CWE-94 - Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.