Siemens JT2Go and Teamcenter Visualization products
Plan Patch7.8ICS-CERT ICSA-21-222-01Aug 10, 2021
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Siemens JT2Go and Teamcenter Visualization contain buffer overflow (CWE-787), out-of-bounds read (CWE-125), use-after-free (CWE-416), and null pointer dereference (CWE-476) vulnerabilities in their CAD file parsers. These vulnerabilities affect versions before 13.2.0.1 and can be triggered when a user opens a malicious file in CGM, DGN, DXF, or DWG format. A successful attack could cause the application to crash or allow arbitrary code execution on the user's workstation. The vulnerabilities stem from code provided by Open Design Alliance.
What this means
What could happen
If a plant operator or engineer opens a malicious CAD file (CGM, DGN, DXF, or DWG) in JT2Go or Teamcenter Visualization, the application could crash, losing access to design data, or an attacker could execute arbitrary commands on the workstation.
Who's at risk
Engineering and design teams who use JT2Go or Teamcenter Visualization to review CAD files (CGM, DGN, DXF, DWG formats). This includes plant engineers, designers, and any workstations used for design review or documentation management in manufacturing, utilities, or process industries.
How it could be exploited
An attacker crafts a malicious CAD file in one of the supported formats (CGM, DGN, DXF, DWG) and tricks a user into opening it with JT2Go or Teamcenter Visualization. The malformed file triggers a buffer overflow, out-of-bounds read, or use-after-free error in the file parser, causing a crash or code execution on the user's machine.
Prerequisites
- User must open a malicious file with JT2Go or Teamcenter Visualization
- File must be in one of the vulnerable formats: CGM, DGN, DXF, or DWG
- No special network access or credentials required
Low complexity to exploitUser interaction required (must trick user to open file)Affects desktop engineering workstationsCould lead to code execution on workstation
Exploitability
Low exploit probability (EPSS 0.3%)
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
JT2Go<V13.2.0.113.2.0.1
Teamcenter Visualization<V13.2.0.113.2.0.1
Remediation & Mitigation
0/4
Do now
0/1WORKAROUNDDo not open CAD files (CGM, DGN, DXF, DWG) from untrusted or unknown sources in these products
Schedule — requires maintenance window
0/2Patching may require device reboot — plan for process interruption
JT2Go
HOTFIXUpdate JT2Go to version 13.2.0.1 or later
Teamcenter Visualization
HOTFIXUpdate Teamcenter Visualization to version 13.2.0.1 or later
Long-term hardening
0/1HARDENINGTrain users to avoid clicking web links or opening attachments from unsolicited emails that may contain malicious CAD files
CVEs (7)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/6473323e-b2b0-4118-8f28-54baafd72fed