First published: Tue Jan 12 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.1.0.1 | |
Siemens Solid Edge | <se2021 | |
Siemens Solid Edge | =se2021 | |
Siemens Solid Edge | =se2021-maintenance_pack1 | |
Siemens Teamcenter Visualization | <13.1.0.1 | |
Siemens JT2Go | ||
Siemens JT2Go | <13.1.0.1 | 13.1.0.1 |
Siemens Teamcenter Visualization | <13.1.0.1 | 13.1.0.1 |
Siemens Solid Edge: All versions prior to SE2021MP2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-26989.
Remote attackers can exploit the vulnerability by executing arbitrary code on affected installations of Siemens JT2Go through malicious pages or files that require user interaction.
The severity rating of the vulnerability is 7.8 (High).
Siemens JT2Go versions up to and excluding 13.1.0.1, Siemens Solid Edge se2021, Siemens Solid Edge se2021-maintenance_pack1, and Siemens Teamcenter Visualization versions up to and excluding 13.1.0.1 are affected by the vulnerability.
Yes, you can find more information about the vulnerability at the following references: - https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/ - https://www.zerodayinitiative.com/advisories/ZDI-21-050/ - https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf