OTPulse

Multiple File Parsing Vulnerabilities in JTTK before V10.8.1.1 and JT Utilities before V12.8.1.1

Plan Patch7.8SSA-396621Dec 14, 2021
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

JTTK before V10.8.1.1 and JT Utilities before V12.8.1.1 contain multiple file parsing vulnerabilities (CWE-787 buffer overflow, CWE-125 out-of-bounds read) in their JT file handling. When a user opens a specially crafted malicious JT file, the vulnerability can cause the application to crash or potentially execute arbitrary code with the privileges of the user running the application.

What this means
What could happen
A user tricked into opening a malicious JT file in JTTK or JT Utilities could allow the application to crash or run arbitrary code on their workstation, potentially compromising the system and any data it accesses.
Who's at risk
Engineering and design staff who use Siemens JTTK or JT Utilities for 3D model and design file processing. This includes CAD/CAM operators, design engineers, and technical staff at utilities, manufacturing facilities, and engineering firms who work with JT format files.
How it could be exploited
An attacker sends or hosts a malicious JT file. A user with JTTK or JT Utilities installed opens the file through the application. The file parsing vulnerability triggers, causing either a denial of service (crash) or arbitrary code execution in the user's security context.
Prerequisites
  • User must have JTTK or JT Utilities installed
  • User must open a malicious JT file using the vulnerable application
  • No special privileges or authentication required
Low complexity attackUser interaction requiredPotential for arbitrary code executionNo special credentials neededAffected products are design/engineering tools
Exploitability
Low exploit probability (EPSS 0.4%)
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
JT Utilities< V12.8.1.112.8.1.1
JTTK< V10.8.1.110.8.1.1
Remediation & Mitigation
0/4
Do now
0/1
HARDENINGTrain users to avoid opening JT files from untrusted or unknown sources
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

JT Utilities
HOTFIXUpdate JT Utilities to version 12.8.1.1 or later
JTTK
HOTFIXUpdate JTTK to version 10.8.1.1 or later
Long-term hardening
0/1
HARDENINGConsider restricting or monitoring use of JT file downloads from email and web sources
↑↓ Navigate · Esc Close
API: /api/v1/advisories/e7a7f1f3-73f3-4ae7-b84c-4247fa2c1338
Multiple File Parsing Vulnerabilities in JTTK before V10.8.1.1 and JT Utilities before V12.8.1.1 | CVSS 7.8 - OTPulse