First published: Tue Aug 10 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.2.0.2), Teamcenter Visualization (All versions < V13.2.0.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-13405)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.2.0.2 | |
Siemens Teamcenter Visualization | <13.2.0.2 | |
Siemens JT2Go | <13.2.0.2 | 13.2.0.2 |
Siemens Teamcenter Visualization | <13.2.0.2 | 13.2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33738 is considered to have a high severity due to the potential for remote code execution by manipulating PAR files.
The vulnerability can be mitigated by upgrading to version 13.2.0.2 of Siemens JT2Go or Teamcenter Visualization.
CVE-2021-33738 affects all versions of Siemens JT2Go and Teamcenter Visualization prior to 13.2.0.2.
CVE-2021-33738 can facilitate remote code execution attacks through the manipulation of user-supplied data in PAR files.
As of now, there are no public reports confirming active exploitation of CVE-2021-33738.