OTPulse

Siemens Solid Edge, JT2Go, and Teamcenter Visualization

Plan Patch7.8ICS-CERT ICSA-23-222-01Aug 8, 2023
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Siemens JT2Go, Teamcenter Visualization, and Solid Edge contain multiple file parsing vulnerabilities in ASM and TIFF file format handling. These vulnerabilities are triggered when a user opens a malicious file, potentially allowing arbitrary code execution or application crash. The vulnerabilities exist in CWE-416 (use-after-free), CWE-125 (out-of-bounds read), and CWE-787 (out-of-bounds write).

What this means
What could happen
A user tricked into opening a malicious file (ASM or TIFF format) in Solid Edge, JT2Go, or Teamcenter Visualization could allow an attacker to run arbitrary commands on the engineering workstation, potentially compromising design data and plant documentation, or causing the application to crash and disrupt CAD workflows.
Who's at risk
Engineering teams and design departments at manufacturing, automotive, aerospace, and heavy equipment companies that use Siemens Solid Edge CAD software, JT2Go visualization tools, or Teamcenter Visualization for product design and collaboration. This affects engineering workstations running any of the affected product versions.
How it could be exploited
An attacker crafts a malicious ASM or TIFF file and tricks a user (via email, shared folder, or download link) into opening it with one of the affected applications. The vulnerability in file parsing allows the attacker to execute arbitrary code on the workstation with the same privileges as the user running the application.
Prerequisites
  • User interaction required—victim must open the malicious file
  • Attacker must deliver the malicious file to the target user (email, file share, etc.)
  • Victim must be running an affected version of Solid Edge, JT2Go, or Teamcenter Visualization
User interaction required (social engineering vector)Arbitrary code execution possibleNo remote exploitation requiredDesign and intellectual property at riskPotential for supply chain attack if CAD files are shared with suppliers or partners
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (9)
9 with fix
ProductAffected VersionsFix Status
JT2Go<V14.2.0.514.2.0.5
Solid Edge SE2022<V222.0 Update 13222.0 Update 13
Solid Edge SE2023<V223.0 Update 4223.0 Update 4
Teamcenter Visualization V13.2<V13.2.0.1513.2.0.15
Teamcenter Visualization V13.2<V13.2.0.1413.2.0.14
Teamcenter Visualization V13.3<V13.3.0.1113.3.0.11
Teamcenter Visualization V14.1<V14.1.0.1114.1.0.11
Teamcenter Visualization V14.1<V14.1.0.1014.1.0.10
Remediation & Mitigation
0/9
Do now
0/1
JT2Go
WORKAROUNDDo not open untrusted or unsolicited files (especially ASM and TIFF files) in Solid Edge, JT2Go, or Teamcenter Visualization
Schedule — requires maintenance window
0/7

Patching may require device reboot — plan for process interruption

JT2Go
HOTFIXUpdate JT2Go to version 14.2.0.5 or later
Solid Edge SE2022
HOTFIXUpdate Solid Edge SE2022 to version 222.0 Update 13 or later
Solid Edge SE2023
HOTFIXUpdate Solid Edge SE2023 to version 223.0 Update 4 or later
Teamcenter Visualization V13.2
HOTFIXUpdate Teamcenter Visualization V13.2 to version 13.2.0.15 or later
Teamcenter Visualization V13.3
HOTFIXUpdate Teamcenter Visualization V13.3 to version 13.3.0.11 or later
Teamcenter Visualization V14.1
HOTFIXUpdate Teamcenter Visualization V14.1 to version 14.1.0.11 or later
Teamcenter Visualization V14.2
HOTFIXUpdate Teamcenter Visualization V14.2 to version 14.2.0.5 or later
Long-term hardening
0/1
HARDENINGTrain users to recognize phishing and social engineering attempts targeting file delivery; do not open file attachments from untrusted senders
↑↓ Navigate · Esc Close
API: /api/v1/advisories/7d2366a3-0ca4-47e6-9d3b-b9a507f08168
Siemens Solid Edge, JT2Go, and Teamcenter Visualization | CVSS 7.8 - OTPulse