First published: Tue Jan 12 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). When opening a specially crafted xml file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11890)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.1.0 | |
Siemens Teamcenter Visualization | <13.1.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26981 has a high severity rating due to the potential for unauthorized file disclosure.
To remediate CVE-2020-26981, upgrade to versions 13.1.0 or later of JT2Go and Teamcenter Visualization.
CVE-2020-26981 affects JT2Go and Teamcenter Visualization versions prior to 13.1.0.
CVE-2020-26981 allows remote attackers to disclose arbitrary files through specially crafted XML files.
Yes, CVE-2020-26981 can be triggered by processing specially crafted XML files passed to the application.