First published: Tue Jan 09 2024(Updated: )
A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a stack overflow vulnerability while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <14.3.0.6 | |
Siemens Teamcenter Visualization | >=13.3.0<13.3.0.13 | |
Siemens Teamcenter Visualization | >=14.1<14.1.0.12 | |
Siemens Teamcenter Visualization | >=14.2<14.2.0.9 | |
Siemens Teamcenter Visualization | >=14.3<14.3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51746 is considered a critical vulnerability due to its potential impact on the confidentiality, integrity, and availability of affected Siemens software.
To fix CVE-2023-51746, users should update their JT2Go and Teamcenter Visualization software to the latest versions as specified by Siemens.
CVE-2023-51746 affects all versions of JT2Go prior to V14.3.0.6 and various versions of Teamcenter Visualization before their respective fixed releases.
Exploiting CVE-2023-51746 could allow an attacker to execute arbitrary code on the affected systems, leading to severe security breaches.
Currently, Siemens has not provided any recommended workarounds for CVE-2023-51746, so upgrading to the latest software version is advised.