Siemens JT Open Toolkit and Simcenter Femap
JT Open Toolkit (JTTK) and Simcenter Femap contain an uninitialized pointer reference vulnerability in the JT file parser (CWE-824). When a user opens a malicious JT file with an affected version, the parser dereferences an uninitialized pointer, which could cause the application to crash or execute arbitrary code with the privileges of the user. The vulnerability requires user interaction to exploit (opening a file) but does not require network access. Siemens has released patched versions for all affected products.
- User must open a malicious JT file with an affected version of JTTK or Simcenter Femap
- Social engineering or supply chain compromise to deliver the malicious file
- No special network access required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/29756f4f-2d24-4bdc-ac8b-21b9d8651557Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.