Siemens Teamcenter Visualization and JT2Go
Plan Patch7.8ICS-CERT ICSA-24-011-06Jan 9, 2024
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Siemens Teamcenter Visualization and JT2Go contain multiple file parsing vulnerabilities (CWE-125 out-of-bounds read, CWE-476 null pointer dereference, CWE-121 stack-based buffer overflow) triggered when reading malicious CGM files. If a user opens a malicious CGM file, the application may crash or allow arbitrary code execution. The following products are affected: JT2Go (<V14.3.0.6), Teamcenter Visualization V13.3 (<V13.3.0.13), Teamcenter Visualization V14.1 (<V14.1.0.12), Teamcenter Visualization V14.2 (<V14.2.0.9), and Teamcenter Visualization V14.3 (<V14.3.0.6). These vulnerabilities are not remotely exploitable; user interaction is required.
What this means
What could happen
An attacker could trick a user into opening a malicious file, which would cause the Teamcenter Visualization or JT2Go application to crash or potentially execute arbitrary code on the engineering workstation. This could compromise the integrity of design data or allow unauthorized access to the CAD/PLM system.
Who's at risk
Organizations using Siemens Teamcenter Visualization (versions 13.3, 14.1, 14.2, or 14.3) or JT2Go for CAD/PLM workflows should be concerned. This affects engineering and design teams who use these tools to view and analyze product design files. The vulnerability is particularly relevant in manufacturing, aerospace, automotive, and other industries that rely on Teamcenter for product lifecycle management.
How it could be exploited
An attacker sends or hosts a malicious CGM file (a graphics format used in CAD/design workflows) and tricks a user into opening it with JT2Go or Teamcenter Visualization. The vulnerable file parsing code has memory safety issues (buffer overflow, null pointer dereference) that trigger when the malicious file is read, crashing the application or executing the attacker's code in the context of the logged-in user.
Prerequisites
- User interaction required: victim must open a malicious CGM file
- Local access to the workstation running JT2Go or Teamcenter Visualization
- Attacker must successfully socially engineer the user to open an untrusted file
User interaction required (social engineering vector)Low exploit complexityCould lead to code execution on engineering workstationsAffects design data integrity and PLM system accessMultiple products and versions affected
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (5)
5 with fix
ProductAffected VersionsFix Status
JT2Go<V14.3.0.614.3.0.6
Teamcenter Visualization V13.3<V13.3.0.1313.3.0.13
Teamcenter Visualization V14.1<V14.1.0.1214.1.0.12
Teamcenter Visualization V14.2<V14.2.0.914.2.0.9
Teamcenter Visualization V14.3<V14.3.0.614.3.0.6
Remediation & Mitigation
0/7
Do now
0/1JT2Go
WORKAROUNDTrain users to avoid opening CGM files from untrusted sources and verify file origin before opening in Teamcenter Visualization or JT2Go
Schedule — requires maintenance window
0/6Patching may require device reboot — plan for process interruption
JT2Go
HOTFIXUpdate JT2Go to version 14.3.0.6 or later
Teamcenter Visualization V13.3
HOTFIXUpdate Teamcenter Visualization V13.3 to version 13.3.0.13 or later
Teamcenter Visualization V14.1
HOTFIXUpdate Teamcenter Visualization V14.1 to version 14.1.0.12 or later
Teamcenter Visualization V14.2
HOTFIXUpdate Teamcenter Visualization V14.2 to version 14.2.0.9 or later
Teamcenter Visualization V14.3
HOTFIXUpdate Teamcenter Visualization V14.3 to version 14.3.0.6 or later
All products
HARDENINGDisable automatic file opening features or use file type associations to prevent accidental execution of CGM files
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/4f65e404-198c-4b83-9e15-d4f401aeb2b6