First published: Tue Jun 13 2023(Updated: )
A vulnerability has been identified in JT2Go (All versions < V14.2.0.3), Teamcenter Visualization V13.2 (All versions < V13.2.0.13), Teamcenter Visualization V13.3 (All versions < V13.3.0.10), Teamcenter Visualization V14.0 (All versions < V14.0.0.6), Teamcenter Visualization V14.1 (All versions < V14.1.0.8), Teamcenter Visualization V14.2 (All versions < V14.2.0.3). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <14.2.0.3 | |
Siemens Teamcenter Visualization | <13.2.0.13 | |
Siemens Teamcenter Visualization | >=13.3.0<13.3.0.10 | |
Siemens Teamcenter Visualization | >=14.0<14.0.0.6 | |
Siemens Teamcenter Visualization | >=14.1<14.1.0.8 | |
Siemens Teamcenter Visualization | >=14.2<14.2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-33121.
The vulnerability affects JT2Go (All versions < V14.2.0.3), Teamcenter Visualization V13.2 (All versions < V13.2.0.13), Teamcenter Visualization V13.3 (All versions < V13.3.0.10), Teamcenter Visualization V14.0 (All versions < V14.0.0.6), Teamcenter Visualization V14.1 (All versions < V14.1.0.8), and Teamcenter Visualization V14.2 (All versions < V14.2.0.3).
The severity of CVE-2023-33121 is medium with a CVSS score of 5.5.
To fix CVE-2023-33121, update JT2Go to version V14.2.0.3 or later and update Teamcenter Visualization to V13.2.0.13 or later, V13.3.0.10 or later, V14.0.0.6 or later, V14.1.0.8 or later, or V14.2.0.3 or later.
You can find more information about CVE-2023-33121 in the following reference: [Siemens ProductCERT Advisory SSA-538795](https://cert-portal.siemens.com/productcert/pdf/ssa-538795.pdf).