OTPulse

Stack-Based Buffer Overflow Vulnerability in JT2Go Before V2406.0003

Plan Patch7.8SSA-626178Oct 8, 2024
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

JT2Go is affected by a stack-based buffer overflow vulnerability in PDF file handling. When a user opens a crafted malicious PDF file, the vulnerability can be triggered, potentially allowing arbitrary code execution on the workstation or causing the application to crash. Siemens has released version 2406.0003 which corrects this issue.

What this means
What could happen
A user tricked into opening a malicious PDF file in JT2Go could allow an attacker to crash the application or execute arbitrary code on the workstation running the viewer.
Who's at risk
Engineering and design workstation users who rely on JT2Go for viewing and managing CAD files and technical documentation. This affects Siemens PLM software deployments in manufacturing, utilities, and industrial settings where design review and process engineering occur.
How it could be exploited
An attacker crafts a malicious PDF file and tricks a user into opening it with JT2Go. When the application processes the file, the buffer overflow is triggered, allowing code execution on the user's workstation or causing the application to crash.
Prerequisites
  • User interaction required: the target user must open a malicious PDF file in JT2Go
  • Affected version of JT2Go must be installed (any version before 2406.0003)
user interaction requiredlow complexity exploitationno authentication required
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
JT2Go< V2406.00032406.0003
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate JT2Go to version 2406.0003 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/91bc0142-9a4f-4ef4-9d03-43fbc874d6c8