Siemens Teamcenter Visualization and JT2Go
Teamcenter Visualization (V14.1, V14.2, V14.3, V2312) and JT2Go contain buffer overflow vulnerabilities (CWE-121, CWE-787) in their file parsers. When a user opens a malicious CGM (Computer Graphics Metafile) or XML file, the affected applications fail to properly validate or handle the file structure, leading to memory corruption. This could result in application crash (denial of service) or arbitrary code execution in the context of the application user. The vulnerability requires user interaction—a user must be tricked into opening the malicious file. No remote exploitation is possible.
- User must open a malicious CGM or XML file attachment
- Must have Teamcenter Visualization or JT2Go installed and executable on the user's workstation
- No elevated privileges required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/414803e3-6525-4c09-ac1c-a5fdfa00bbf6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.