Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Plan Patch7.8SSA-700053Dec 13, 2022
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Siemens Teamcenter Visualization and JT2Go contain multiple file parsing vulnerabilities in CGM and RAS file format handlers. These vulnerabilities include null pointer dereference (CWE-476), buffer over-read (CWE-125), buffer overflow (CWE-787), use-after-free (CWE-416), divide-by-zero (CWE-369), and resource exhaustion (CWE-770). When a user opens a malicious CGM or RAS file, the vulnerable parsing code can crash the application or allow arbitrary code execution on the engineering workstation.
What this means
What could happen
An attacker could trick a user into opening a malicious CGM or RAS file, causing the application to crash or potentially execute arbitrary code on the engineering workstation.
Who's at risk
Engineering and design departments using Siemens Teamcenter Visualization or JT2Go for CAD/CAM visualization work on engineering workstations. This includes manufacturing, automotive, aerospace, and industrial design firms that handle design files for product visualization and collaboration.
How it could be exploited
An attacker sends or hosts a malicious CGM or RAS file and tricks or socially engineers a user into opening it in JT2Go or Teamcenter Visualization. The vulnerable file parsing code processes the malformed file, triggering memory corruption (buffer overflow, use-after-free, or null pointer dereference) that leads to application crash or code execution.
Prerequisites
- User must open a malicious file (CGM or RAS format) in the affected application
- Affected Teamcenter Visualization or JT2Go application must be installed and in use
requires user interaction (file open)affects engineering workstationsmultiple memory safety vulnerabilities (CWE-476, CWE-125, CWE-787, CWE-416)vendor patches available
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (7)
7 with fix
ProductAffected VersionsFix Status
JT2Go< V14.1.0.614.1.0.6
Teamcenter Visualization V13.2< V13.2.0.1213.2.0.12
Teamcenter Visualization V13.3< V13.3.0.813.3.0.8
Teamcenter Visualization V13.3< V13.3.0.913.3.0.9
Teamcenter Visualization V14.0< V14.0.0.414.0.0.4
Teamcenter Visualization V14.0< V14.0.0.514.0.0.5
Teamcenter Visualization V14.1< V14.1.0.614.1.0.6
Remediation & Mitigation
0/6
Do now
0/1HARDENINGInstruct users not to open CGM or RAS files from untrusted sources
Schedule — requires maintenance window
0/5Patching may require device reboot — plan for process interruption
JT2Go
HOTFIXUpdate JT2Go to version 14.1.0.6 or later
Teamcenter Visualization V13.2
HOTFIXUpdate Teamcenter Visualization V13.2 to version 13.2.0.12 or later
Teamcenter Visualization V13.3
HOTFIXUpdate Teamcenter Visualization V13.3 to version 13.3.0.9 or later
Teamcenter Visualization V14.0
HOTFIXUpdate Teamcenter Visualization V14.0 to version 14.0.0.5 or later
Teamcenter Visualization V14.1
HOTFIXUpdate Teamcenter Visualization V14.1 to version 14.1.0.6 or later
CVEs (12)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/617d6210-4ec9-48fd-a186-e788691b50c1