Siemens Teamcenter Visualization and JT2Go
Multiple out-of-bounds write vulnerabilities exist in the APDFL library used by Siemens Teamcenter Visualization (versions V13.3 before 13.3.0.8, V14.0 before 14.0.0.4, and V14.1 before 14.1.0.5) and JT2Go (before 14.1.0.5). If a user opens a malicious PDF file with these products, the vulnerable code in the embedded PDF parsing library can write out of bounds in process memory, potentially causing application crash or arbitrary code execution. The vulnerability requires user interaction—an attacker must trick a user into opening a specifically crafted PDF file.
- User must open a malicious PDF file using JT2Go or Teamcenter Visualization
- Attack delivered via email, file sharing, or social engineering
- No network access required, local user interaction required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6f6b62e6-a238-497b-896d-80384377627bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.