Siemens JT2Go and Teamcenter Visualization
JT2Go and Teamcenter Visualization contain multiple buffer overflow and out-of-bounds read vulnerabilities (CWE-822, CWE-125, CWE-121) in their handling of JT 3D model files. These vulnerabilities can be exploited through a specially crafted JT file that, when opened by a user, could lead to arbitrary code execution or disclosure of sensitive information from the workstation memory. The vulnerabilities require local file access and user interaction—an attacker must convince a user to open a malicious JT file.
- Local file system access or ability to deliver file to target user
- User interaction required: victim must open the malicious JT file
- JT2Go or Teamcenter Visualization software installed on workstation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/51dd788d-9760-4b8b-a48b-8bcdcf8f2273Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.