OTPulse

Datalogics File Parsing Vulnerability in Teamcenter Visualization and JT2Go

Plan Patch7.8SSA-722010Jul 9, 2024
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Siemens Teamcenter Visualization and JT2Go contain an out-of-bounds read vulnerability in the APDFL library (from Datalogics) used for PDF file parsing. A user who opens a malicious PDF file with an affected product may trigger application crash or arbitrary code execution.

What this means
What could happen
If an operator or engineer opens a crafted PDF file in Teamcenter Visualization or JT2Go, the application could crash or allow arbitrary code execution on the workstation, potentially compromising design data or allowing lateral movement into the engineering network.
Who's at risk
Engineering and design personnel at utilities and manufacturers who use Siemens Teamcenter Visualization or JT2Go for design document review and visualization. This includes fossil, nuclear, hydro, and renewable energy facilities, as well as water treatment plants and industrial manufacturers that depend on these tools for engineering workflows.
How it could be exploited
An attacker could craft a malicious PDF file and send it via email or place it on a shared drive. When an engineer or operator opens the file in JT2Go or Teamcenter Visualization, the vulnerable PDF parser (APDFL) processes the malformed PDF and triggers an out-of-bounds read. This could cause the application to crash or, if memory conditions align, execute arbitrary code with the privileges of the user running the application.
Prerequisites
  • User must open a malicious PDF file using an affected version of Teamcenter Visualization or JT2Go
  • PDF file must be crafted to trigger the out-of-bounds read in the APDFL library
locally exploitable (requires user interaction)low complexity attackno authentication requiredaffects engineering workstations
Exploitability
Low exploit probability (EPSS 0.2%)
Affected products (5)
5 with fix
ProductAffected VersionsFix Status
JT2Go<V14.3.0.814.3.0.8
Teamcenter Visualization V14.1<V14.1.0.1414.1.0.14
Teamcenter Visualization V14.2<V14.2.0.1014.2.0.10
Teamcenter Visualization V14.3<V14.3.0.814.3.0.8
Teamcenter Visualization V2312<V2312.00022312.0002
Remediation & Mitigation
0/6
Do now
0/1
HARDENINGEducate users not to open PDF files from untrusted sources or unexpected emails
Schedule — requires maintenance window
0/5

Patching may require device reboot — plan for process interruption

JT2Go
HOTFIXUpdate JT2Go to version 14.3.0.8 or later
Teamcenter Visualization V14.1
HOTFIXUpdate Teamcenter Visualization V14.1 to version 14.1.0.14 or later
Teamcenter Visualization V14.2
HOTFIXUpdate Teamcenter Visualization V14.2 to version 14.2.0.10 or later
Teamcenter Visualization V14.3
HOTFIXUpdate Teamcenter Visualization V14.3 to version 14.3.0.8 or later
Teamcenter Visualization V2312
HOTFIXUpdate Teamcenter Visualization V2312 to version 2312.0002 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/7aad51be-4a5d-4da1-9a57-a81ecf2630c7