OTPulse

TIFF File Parsing Vulnerability in JT2Go and Teamcenter Visualization before V13.1.0.3

Plan Patch7.8SSA-645530Jun 8, 2021
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

A memory safety vulnerability (out-of-bounds write) exists in the TIFF file parsing code of JT2Go and Teamcenter Visualization versions before V13.1.0.3. When processing a malicious TIFF file, the vulnerability can be triggered to cause application crash, arbitrary code execution, or extraction of sensitive data from the affected workstation. The vulnerability requires user interaction (opening the malicious file) but does not require authentication or special privileges.

What this means
What could happen
A user tricked into opening a malicious TIFF file in JT2Go or Teamcenter Visualization could allow an attacker to crash the application, execute arbitrary code, or extract sensitive design and manufacturing data from the workstation.
Who's at risk
Engineering and design staff who use JT2Go or Teamcenter Visualization for 3D CAD visualization and manufacturing reviews. This includes automotive, machinery, industrial equipment design teams, and any organization that relies on Siemens visualization tools for product design workflows.
How it could be exploited
An attacker crafts a malicious TIFF file and sends it to engineering or design staff via email or file sharing. When a user opens the file with JT2Go or Teamcenter Visualization, the vulnerable TIFF parsing code processes the malicious content and triggers a memory safety issue (out-of-bounds write), allowing code execution or data theft on that workstation.
Prerequisites
  • User must open a malicious TIFF file with JT2Go or Teamcenter Visualization
  • No authentication or special privileges required
  • File can be delivered via email, USB, or network file share
Low complexity exploitationUser interaction required (file open)Potential for arbitrary code executionAccess to sensitive design and manufacturing dataDesign workstations often have elevated access to manufacturing networks
Exploitability
Low exploit probability (EPSS 0.3%)
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
JT2Go< V13.1.0.313.1.0.3
Teamcenter Visualization< V13.1.0.313.1.0.3
Remediation & Mitigation
0/4
Do now
0/2
HARDENINGImplement user training to avoid opening TIFF files from untrusted sources or unknown senders
WORKAROUNDConfigure email gateway rules to block or quarantine suspicious TIFF file attachments from external senders
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

JT2Go
HOTFIXUpdate JT2Go to version 13.1.0.3 or later
Teamcenter Visualization
HOTFIXUpdate Teamcenter Visualization to version 13.1.0.3 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/522bfc20-f43d-4bb0-8745-6e217dd85cf8
TIFF File Parsing Vulnerability in JT2Go and Teamcenter Visualization before V13.1.0.3 | CVSS 7.8 - OTPulse