Siemens JT2Go and Teamcenter Visualization products
Siemens JT2Go and Teamcenter Visualization contain buffer overflow (CWE-787), out-of-bounds read (CWE-125), use-after-free (CWE-416), and null pointer dereference (CWE-476) vulnerabilities in their CAD file parsers. These vulnerabilities affect versions before 13.2.0.1 and can be triggered when a user opens a malicious file in CGM, DGN, DXF, or DWG format. A successful attack could cause the application to crash or allow arbitrary code execution on the user's workstation. The vulnerabilities stem from code provided by Open Design Alliance.
- User must open a malicious file with JT2Go or Teamcenter Visualization
- File must be in one of the vulnerable formats: CGM, DGN, DXF, or DWG
- No special network access or credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6473323e-b2b0-4118-8f28-54baafd72fedGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.