OTPulse

Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2

Plan Patch7.8SSA-483182Jul 13, 2021
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Multiple file parsing vulnerabilities exist in JT2Go and Teamcenter Visualization versions before V13.2. These flaws are triggered when the products read files in GIF, TIFF, BMP, J2K, JT, SGI, PDF, PCT, PCX, PAR, and ASM formats. The vulnerabilities include buffer overflows, out-of-bounds reads, use-after-free, and integer overflow conditions (CWE-787, CWE-125, CWE-416, CWE-126, CWE-119, CWE-122, CWE-835, CWE-415). A user tricked into opening a malicious file could experience application crash or arbitrary code execution on the target system.

What this means
What could happen
A user tricked into opening a malicious file in JT2Go or Teamcenter Visualization could trigger a memory corruption vulnerability that causes the application to crash or allows an attacker to run arbitrary code on the workstation.
Who's at risk
Engineering teams and CAD/manufacturing personnel who use Siemens JT2Go or Teamcenter Visualization for design review, 3D model viewing, and product lifecycle management. This includes architects, engineers, and manufacturing planners at any organization using Siemens digital manufacturing tools.
How it could be exploited
An attacker crafts a malicious file in one of the supported formats (GIF, TIFF, BMP, J2K, JT, SGI, PDF, PCT, PCX, PAR, ASM) and tricks or socially engineers a user into opening it with JT2Go or Teamcenter Visualization. The file parsing code contains buffer overflows and use-after-free flaws that execute arbitrary code when processed.
Prerequisites
  • User must open a malicious file with JT2Go or Teamcenter Visualization
  • File must be in one of the vulnerable formats: GIF, TIFF, BMP, J2K, JT, SGI, PDF, PCT, PCX, PAR, ASM
user interaction requiredaffects engineering workstationsmemory corruption vulnerabilitiesmultiple file format support increases attack surfacelow exploit complexity
Exploitability
Low exploit probability (EPSS 0.5%)
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
JT2Go< V13.213.2
Teamcenter Visualization< V13.213.2
Remediation & Mitigation
0/4
Do now
0/2
HARDENINGEducate users to avoid opening files from unknown or untrusted sources in these products
HARDENINGDisable file open prompts for untrusted email attachments or downloaded files where possible
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

JT2Go
HOTFIXUpdate JT2Go to version 13.2 or later
Teamcenter Visualization
HOTFIXUpdate Teamcenter Visualization to version 13.2 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/fc2ea8cc-849d-44cd-bc39-43126b95adbc
Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2 | CVSS 7.8 - OTPulse