
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-27639 affects SAP 3D Visual Enterprise Viewer version 9, where a user can open manipulated JT files received from untrusted sources. This vulnerability was discovered and disclosed in February 2021, and it results in the application crashing and becoming temporarily unavailable until the user restarts the application, caused by Improper Input Validation (CVE Details).
The vulnerability stems from improper input validation in SAP 3D Visual Enterprise Viewer version 9 when processing JT files. When a malicious JT file is opened, it triggers a crash in the application due to insufficient validation of the file's content (SAP Security Note).
The primary impact of this vulnerability is temporary denial of service, as it causes the application to crash and become unavailable until manually restarted by the user. The impact is limited to availability, with no direct effect on confidentiality or integrity of the system (CVE Details).
SAP has released a security patch to address this vulnerability. Users are advised to update to the latest version of SAP 3D Visual Enterprise Viewer. Additionally, users should exercise caution when opening JT files from untrusted sources (SAP Security Note).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."