First published: Tue Jan 09 2024(Updated: )
A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a stack overflow vulnerability while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <14.3.0.6 | |
Siemens Teamcenter Visualization | >=13.3.0<13.3.0.13 | |
Siemens Teamcenter Visualization | >=14.1<14.1.0.12 | |
Siemens Teamcenter Visualization | >=14.2<14.2.0.9 | |
Siemens Teamcenter Visualization | >=14.3<14.3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51745 has been classified as a high severity vulnerability.
To fix CVE-2023-51745, upgrade to JT2Go version 14.3.0.6 or later, or to the respective patched versions of Teamcenter Visualization.
CVE-2023-51745 affects all versions of JT2Go prior to 14.3.0.6 and multiple versions of Teamcenter Visualization before their respective patch levels.
The impact of CVE-2023-51745 may include unauthorized access to sensitive data.
No official workaround has been provided for CVE-2023-51745, so upgrading to a fixed version is recommended.