OTPulse

File parsing Vulnerabilities in Solid Edge, JT2Go and Teamcenter Visualization

Plan Patch7.8SSA-131450Aug 8, 2023
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Siemens JT2Go, Teamcenter Visualization, and Solid Edge contain multiple file parsing vulnerabilities in their ASM and TIFF file handlers. These vulnerabilities are triggered by use-after-free (CWE-416), buffer over-read (CWE-125), and buffer overflow (CWE-787) flaws. A user tricked into opening a malicious ASM or TIFF file could allow an attacker to crash the application or execute arbitrary code with user privileges. Siemens has released vendor patches for all affected versions.

What this means
What could happen
An attacker could trick a user into opening a malicious CAD file (ASM or TIFF format), causing the application to crash or potentially executing arbitrary code on the engineering workstation with the privileges of the user running the application.
Who's at risk
Engineering teams using Siemens CAD and PLM software: Solid Edge users (SE2022, SE2023), JT2Go users for CAD visualization, and Teamcenter Visualization users (V13.2, V13.3, V14.1, V14.2). Risk is highest for design engineers and drafters who frequently receive CAD files from external partners or customers.
How it could be exploited
An attacker crafts a malicious ASM or TIFF file and sends it to a user via email or places it on a shared file server. When the user opens the file in JT2Go, Solid Edge, or Teamcenter Visualization, the vulnerable file parser triggers a use-after-free, buffer overflow, or out-of-bounds read, allowing the attacker to execute code or crash the application.
Prerequisites
  • User must open a malicious file attachment or document from an untrusted source
  • The file must be in ASM or TIFF format
  • One of the affected product versions must be installed on the workstation
User interaction required (social engineering via file attachment)low complexity exploitaffects engineering workstations with potential for code executionparser vulnerabilities in widely-used CAD tools
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (9)
9 with fix
ProductAffected VersionsFix Status
JT2Go< V14.2.0.514.2.0.5
Solid Edge SE2022< V222.0 Update 13222.0 Update 13
Solid Edge SE2023< V223.0 Update 4223.0 Update 4
Teamcenter Visualization V13.2< V13.2.0.1513.2.0.15
Teamcenter Visualization V13.2< V13.2.0.1413.2.0.14
Teamcenter Visualization V13.3< V13.3.0.1113.3.0.11
Teamcenter Visualization V14.1< V14.1.0.1114.1.0.11
Teamcenter Visualization V14.1< V14.1.0.1014.1.0.10
Remediation & Mitigation
0/9
Do now
0/1
WORKAROUNDWarn users not to open ASM or TIFF files from untrusted sources until patches are deployed
Schedule — requires maintenance window
0/7

Patching may require device reboot — plan for process interruption

JT2Go
HOTFIXUpdate JT2Go to version 14.2.0.5 or later
Solid Edge SE2022
HOTFIXUpdate Solid Edge SE2022 to version 222.0 Update 13 or later
Solid Edge SE2023
HOTFIXUpdate Solid Edge SE2023 to version 223.0 Update 4 or later
Teamcenter Visualization V13.2
HOTFIXUpdate Teamcenter Visualization V13.2 to version 13.2.0.15 or later
Teamcenter Visualization V13.3
HOTFIXUpdate Teamcenter Visualization V13.3 to version 13.3.0.11 or later
Teamcenter Visualization V14.1
HOTFIXUpdate Teamcenter Visualization V14.1 to version 14.1.0.11 or later
Teamcenter Visualization V14.2
HOTFIXUpdate Teamcenter Visualization V14.2 to version 14.2.0.5 or later
Long-term hardening
0/1
HARDENINGBlock or restrict file sharing mechanisms (email, file servers) for ASM and TIFF files from external sources as a temporary control
↑↓ Navigate · Esc Close
API: /api/v1/advisories/1c54939f-7698-4257-a99d-4e1929875604