Siemens Teamcenter Visualization and JT2Go
Siemens Teamcenter Visualization (V13.2, V13.3, V14.0, V14.1) and JT2Go contain multiple file parsing vulnerabilities in their TIF, CGM, and PDF file handlers. These vulnerabilities include buffer overflows (CWE-122, CWE-787, CWE-121), out-of-bounds reads (CWE-125), and use-after-free conditions (CWE-416). When a user opens a malicious file in one of these formats, the application may crash or allow arbitrary code execution with the privileges of the user running the application. No public exploits are known, and the vulnerabilities are not remotely exploitable on their own.
- User must open a malicious file attachment or download
- File must be in TIF, CGM, or PDF format
- Vulnerable version of JT2Go or Teamcenter Visualization must be installed
- No special network access or credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6b572b5f-e605-43c4-9f9d-f1295d27f722Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.