OTPulse

X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go

Plan Patch7.8SSA-856475Aug 13, 2024
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Teamcenter Visualization V14.2, V14.3, V2312, and JT2Go contain out-of-bounds read and null pointer dereference vulnerabilities in X_T file parsing. Opening a malicious X_T file could allow arbitrary code execution in the context of the application user. Siemens has released patched versions.

What this means
What could happen
An attacker could trick a user into opening a malicious X_T file (JT format), allowing the attacker to run arbitrary code with the same permissions as the user running the visualization software, potentially compromising engineering workstations and CAD design data.
Who's at risk
Engineering and design departments using Teamcenter Visualization or JT2Go for CAD model review and analysis. This particularly affects manufacturing, product development, and mechanical design teams that receive JT format files from external suppliers, vendors, or consultants.
How it could be exploited
An attacker crafts a malicious X_T format file and sends it to an engineering or design staff member. When the user opens the file in Teamcenter Visualization or JT2Go, the application's file parser encounters an out-of-bounds read or null pointer dereference, crashing the application or executing arbitrary code in the context of the logged-in user.
Prerequisites
  • User interaction required: the user must open a malicious X_T file using Teamcenter Visualization or JT2Go
  • Vulnerable version of Teamcenter Visualization or JT2Go must be installed on the workstation
User interaction required to triggerAffects design and engineering workstationsCould compromise CAD intellectual property
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (4)
4 with fix
ProductAffected VersionsFix Status
JT2Go<V2312.00052312.0005
Teamcenter Visualization V14.2<V14.2.0.1214.2.0.12
Teamcenter Visualization V14.3<V14.3.0.1014.3.0.10
Teamcenter Visualization V2312<V2312.00052312.0005
Remediation & Mitigation
0/6
Do now
0/2
WORKAROUNDImplement email filtering to block or warn users when receiving X_T/JT format files from external sources
HARDENINGEducate engineering and design staff not to open X_T or JT files from untrusted sources
Schedule — requires maintenance window
0/4

Patching may require device reboot — plan for process interruption

JT2Go
HOTFIXUpdate JT2Go to version 2312.0005 or later
Teamcenter Visualization V14.2
HOTFIXUpdate Teamcenter Visualization V14.2 to version 14.2.0.12 or later
Teamcenter Visualization V14.3
HOTFIXUpdate Teamcenter Visualization V14.3 to version 14.3.0.10 or later
Teamcenter Visualization V2312
HOTFIXUpdate Teamcenter Visualization V2312 to version 2312.0005 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/58950fcb-4a0f-4fed-aae1-dad4b7906945
X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | CVSS 7.8 - OTPulse