Siemens Teamcenter Visualization and JT2Go
Siemens Teamcenter Visualization and JT2Go are vulnerable to multiple file parsing flaws in CGM and RAS file handling. When a user opens a crafted malicious file in either format, the vulnerable parser fails to properly validate the file structure. This can trigger a null pointer dereference, out-of-bounds read, heap or stack buffer overflow, use-after-free, integer division by zero, or integer overflow (CWE-476, CWE-125, CWE-787, CWE-416, CWE-369, CWE-770). The result is application crash or arbitrary code execution with the privileges of the user running the application.
- User interaction required: victim must open a malicious CGM or RAS file
- File access: attacker must deliver the malicious file to the victim (email, shared drive, etc.)
- Target must have vulnerable version of Teamcenter Visualization or JT2Go installed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a0bc7b11-5ade-4074-8db5-7d88da573b06Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.