Siemens Solid Edge, JT2Go, and Teamcenter Visualization
Siemens Solid Edge, JT2Go, and Teamcenter Visualization contain multiple buffer overflow and out-of-bounds access vulnerabilities (CWE-119, CWE-787, CWE-122, CWE-125) in file parsing routines. If a user opens a specially crafted file (PDF, DXF, or PAR format) in any affected product, the application may crash or allow arbitrary code execution with the privileges of the user running the application. The vulnerability requires user interaction—an attacker must trick the user into opening a malicious file. Siemens has released patches for JT2Go and Teamcenter Visualization versions 12.4, 13.1, 13.2, and 13.3. Patches for Solid Edge SE2021 and SE2022 are not yet available, and Siemens recommends avoiding untrusted files as a compensating control.
- User must open a malicious file in one of the affected applications
- File must be crafted as PDF, DXF, or PAR format
- No special privileges or network access required
- Social engineering or phishing needed to deliver the malicious file
Patching may require device reboot — plan for process interruption
/api/v1/advisories/52d15366-7975-41e1-8a70-4cd060fc882e