Skip to main content

CVE-2023-51744: CWE-476: NULL Pointer Dereference in Siemens JT2Go

Low
VulnerabilityCVE-2023-51744cvecve-2023-51744cwe-476
Published: Tue Jan 09 2024 (01/09/2024, 10:00:15 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: JT2Go

Description

A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.

AI-Powered Analysis

AILast updated: 07/10/2025, 23:16:19 UTC

Technical Analysis

CVE-2023-51744 is a vulnerability identified in Siemens JT2Go and multiple versions of Teamcenter Visualization software prior to specific patch versions (JT2Go versions before 14.3.0.6, Teamcenter Visualization versions before 13.3.0.13, 14.1.0.12, 14.2.0.9, and 14.3.0.6). The vulnerability is classified as CWE-476, a NULL Pointer Dereference issue, which occurs during the parsing of specially crafted CGM (Computer Graphics Metafile) files. When the affected applications process these maliciously crafted CGM files, they dereference a NULL pointer, leading to an application crash. This crash results in a denial of service (DoS) condition, disrupting normal operation of the software. The vulnerability requires local access (attack vector: local), low attack complexity, no privileges required, but does require user interaction (opening or processing the malicious CGM file). The CVSS v3.1 base score is 3.3, indicating a low severity primarily due to limited impact (no confidentiality or integrity loss) and the need for user interaction. No known exploits are currently reported in the wild. Siemens has not yet published patch links, but affected versions are clearly identified, and upgrading to the fixed versions is implied as the remediation path. This vulnerability impacts environments where Siemens JT2Go or Teamcenter Visualization are used to view or manipulate CGM files, which are common in engineering and manufacturing workflows.

Potential Impact

For European organizations, especially those in manufacturing, automotive, aerospace, and industrial engineering sectors that rely on Siemens JT2Go and Teamcenter Visualization for CAD and visualization tasks, this vulnerability could cause operational disruptions. A successful exploitation leads to application crashes, potentially interrupting design review sessions, collaboration, or automated visualization workflows. Although the impact is limited to denial of service without data compromise, repeated crashes could degrade productivity and cause delays in critical engineering processes. In environments with strict uptime requirements or where these tools are integrated into larger PLM (Product Lifecycle Management) systems, the DoS could have cascading effects. However, since exploitation requires user interaction and local access, the risk of widespread remote exploitation is low. The absence of known active exploits further reduces immediate risk but does not eliminate the need for vigilance. Organizations handling sensitive intellectual property should also consider the indirect risks of disruption to their design and visualization pipelines.

Mitigation Recommendations

European organizations should prioritize upgrading affected Siemens JT2Go and Teamcenter Visualization software to the fixed versions (JT2Go V14.3.0.6 or later, Teamcenter Visualization V13.3.0.13, V14.1.0.12, V14.2.0.9, or V14.3.0.6 and above). Until patches are applied, organizations should implement strict controls on CGM file sources, including validating and sanitizing files before opening them in vulnerable applications. User training is critical to avoid opening CGM files from untrusted or unknown sources. Employ application whitelisting and endpoint protection to detect and prevent anomalous application crashes. Network segmentation can limit exposure of vulnerable systems. Monitoring application logs for crashes related to CGM file processing can help detect attempted exploitation. Additionally, Siemens customers should stay updated with vendor advisories for official patches or workarounds. For environments where these tools are critical, consider deploying them in isolated or sandboxed environments to minimize impact from potential crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2023-12-22T11:30:22.671Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5a1b0bd07c3938ab84

Added to database: 6/10/2025, 6:54:18 PM

Last enriched: 7/10/2025, 11:16:19 PM

Last updated: 8/15/2025, 1:12:22 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats