First published: Tue Aug 10 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.2.0.1), Teamcenter Visualization (All versions < V13.2.0.1). When parsing specially crafted CGM Files, a NULL pointer deference condition could cause the application to crash. The application must be restarted to restore the service. An attacker could leverage this vulnerability to cause a Denial-of-Service condition in the application.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.2.0.1 | |
Siemens Teamcenter Visualization | <13.2.0.1 | |
Siemens JT2Go | <13.2.0.1 | 13.2.0.1 |
Siemens Teamcenter Visualization | <13.2.0.1 | 13.2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33717 has a high severity rating as it can cause application crashes due to NULL pointer dereference when processing malicious CGM files.
To fix CVE-2021-33717, users should upgrade to Siemens JT2Go and Teamcenter Visualization version 13.2.0.1 or later.
CVE-2021-33717 affects all versions of Siemens JT2Go and Teamcenter Visualization prior to version 13.2.0.1.
If CVE-2021-33717 is exploited, the application will crash, requiring a restart to restore service.
There is no known workaround for CVE-2021-33717 other than applying the required software update to address the vulnerability.