First published: Tue Apr 09 2024(Updated: )
A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <V2312.0004 | |
Parasolid | <V35.1.254<V36.0.207<V36.1.147 | |
Siemens Teamcenter Visualization | <V14.2.0.12<V14.3.0.9<V2312.0004 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26275 is classified as a high severity vulnerability affecting multiple Siemens software products.
To mitigate CVE-2024-26275, users should upgrade to the latest versions of affected software as specified by Siemens.
CVE-2024-26275 affects Siemens JT2Go versions prior to V2312.0004 and several versions of Parasolid and Teamcenter Visualization.
CVE-2024-26275 includes vulnerabilities that could potentially allow unauthorized access or manipulation of the affected software.
Yes, Siemens has released patches in the form of updates for the affected products to address CVE-2024-26275.