First published: Tue Feb 09 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of RAS files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12283)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.1.0.1 | |
Siemens Teamcenter Visualization | <13.1.0.1 | |
Siemens JT2Go | <13.1.0.1 | 13.1.0.1 |
Siemens Teamcenter Visualization | <13.1.0.1 | 13.1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28394 is considered a critical vulnerability due to improper validation of user-supplied data leading to potential memory access issues.
To mitigate CVE-2020-28394, ensure that you upgrade to versions 13.1.0.1 or later of Siemens JT2Go and Teamcenter Visualization.
CVE-2020-28394 affects all versions of Siemens JT2Go and Teamcenter Visualization prior to version 13.1.0.1.
Exploitation of CVE-2020-28394 may allow attackers to perform arbitrary memory access leading to data corruption or arbitrary code execution.
Organizations using Siemens JT2Go or Teamcenter Visualization versions below 13.1.0.1 should prioritize addressing CVE-2020-28394 to protect their systems.