Siemens JT Utilities and JT Open Toolkit
JT Open Toolkit (JTTK) versions before 11.1.1.0 and JT Utilities versions before 13.1.1.0 contain multiple memory corruption vulnerabilities (buffer overflow, out-of-bounds access, use-after-free) in the JT file parser. When a user opens a specially crafted JT file, these vulnerabilities can cause the application to crash or execute arbitrary code with user privileges. The vulnerabilities are triggered during file parsing and do not require network access or authentication. Siemens has released patches for both products.
- User interaction required: victim must open a malicious JT file
- Local file access: the JT file must be readable by the affected application on the target machine
- Affected JT Utilities or JTTK version installed on the engineering workstation or design computer
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3d35cb44-2870-4c48-8d85-a73863f694b2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.