OTPulse

X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go

Plan Patch7.8SSA-771940Jun 11, 2024
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Out-of-bounds read, stack exhaustion, and null pointer dereference vulnerabilities in Teamcenter Visualization and JT2Go X_T file parsing. Affected versions: JT2Go pre-2312.0004; Teamcenter Visualization V14.2 pre-14.2.0.12, V14.3 pre-14.3.0.9, V2312 pre-2312.0004. Exploitation requires a user to open a crafted X_T file, resulting in remote code execution in the application context.

What this means
What could happen
An attacker could trick a user into opening a malicious X_T format file, allowing remote code execution on the engineering workstation running Teamcenter Visualization or JT2Go. This could compromise design data, intellectual property, or enable lateral movement into the engineering network.
Who's at risk
Engineering teams and CAD operators who use Teamcenter Visualization (all supported versions including 14.2, 14.3, and 2312) or JT2Go for reviewing and sharing 3D design models in JT/X_T format. This includes automotive suppliers, industrial equipment manufacturers, and discrete manufacturing companies that rely on Siemens design collaboration tools.
How it could be exploited
An attacker crafts a malicious X_T file and socially engineers a user to open it in Teamcenter Visualization or JT2Go. The vulnerable parser encounters out-of-bounds memory reads, stack exhaustion, or null pointer dereferences, triggering memory corruption that results in code execution under the user's privileges.
Prerequisites
  • User must open a malicious X_T file
  • Affected version of Teamcenter Visualization (V14.2 pre-0.12, V14.3 pre-0.9, V2312 pre-0004) or JT2Go (pre-2312.0004) installed
  • Local access to engineering workstation or ability to deliver crafted file to target user
requires user interaction to open malicious filelocal code executionaffects design/engineering workstationslow exploit complexity once file is opened
Exploitability
Low exploit probability (EPSS 0.2%)
Affected products (4)
4 with fix
ProductAffected VersionsFix Status
JT2Go<V2312.00042312.0004
Teamcenter Visualization V14.2<V14.2.0.1214.2.0.12
Teamcenter Visualization V14.3<V14.3.0.914.3.0.9
Teamcenter Visualization V2312<V2312.00042312.0004
Remediation & Mitigation
0/5
Do now
0/1
HARDENINGEducate users not to open X_T files from untrusted sources
Schedule — requires maintenance window
0/4

Patching may require device reboot — plan for process interruption

JT2Go
HOTFIXUpdate JT2Go to version 2312.0004 or later
Teamcenter Visualization V14.2
HOTFIXUpdate Teamcenter Visualization V14.2 to version 14.2.0.12 or later
Teamcenter Visualization V14.3
HOTFIXUpdate Teamcenter Visualization V14.3 to version 14.3.0.9 or later
Teamcenter Visualization V2312
HOTFIXUpdate Teamcenter Visualization V2312 to version 2312.0004 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/a3d802bf-d129-4492-97f1-7664b0213ce5