First published: Tue Jan 09 2024(Updated: )
A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <14.3.0.6 | |
Siemens Teamcenter Visualization | >=13.3.0<13.3.0.13 | |
Siemens Teamcenter Visualization | >=14.1<14.1.0.12 | |
Siemens Teamcenter Visualization | >=14.2<14.2.0.9 | |
Siemens Teamcenter Visualization | >=14.3<14.3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-51744 is classified as critical.
To fix CVE-2023-51744, update JT2Go to version 14.3.0.6 or later, and Teamcenter Visualization to the patched versions indicated.
CVE-2023-51744 affects JT2Go versions prior to 14.3.0.6 and Teamcenter Visualization versions prior to 13.3.0.13, 14.1.0.12, 14.2.0.9, and 14.3.0.6.
As of now, there are no known workarounds for CVE-2023-51744, and upgrading to the latest versions is necessary.
CVE-2023-51744 could potentially allow an attacker to execute arbitrary code or compromise system integrity.