Siemens Teamcenter Visualization and JT2Go
Siemens Teamcenter Visualization and JT2Go are affected by multiple file parsing vulnerabilities in the handling of CGM (Computer Graphics Metafile) format files. These vulnerabilities include null pointer dereference (CWE-476), out-of-bounds read (CWE-125), and buffer overflow (CWE-119). When a user opens a malicious CGM file with an affected product, the application may crash or potentially execute arbitrary code on the user's workstation. The vulnerabilities are triggered during file parsing and require user interaction—a user must be tricked into opening a malicious CGM file.
- User must open a malicious CGM file in Teamcenter Visualization or JT2Go
- User interaction required—attacker must trick the engineer to open the file
- No special credentials or network access required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/50387a68-1b45-43ec-aa51-535b1f1aef9bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.