CVE-2023-51744: CWE-476: NULL Pointer Dereference in Siemens JT2Go
A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.
AI Analysis
Technical Summary
CVE-2023-51744 is a vulnerability identified in Siemens JT2Go and multiple versions of Teamcenter Visualization software prior to specific patch versions (JT2Go versions before 14.3.0.6, Teamcenter Visualization versions before 13.3.0.13, 14.1.0.12, 14.2.0.9, and 14.3.0.6). The vulnerability is classified as CWE-476, a NULL Pointer Dereference issue, which occurs during the parsing of specially crafted CGM (Computer Graphics Metafile) files. When the affected applications process these maliciously crafted CGM files, they dereference a NULL pointer, leading to an application crash. This crash results in a denial of service (DoS) condition, disrupting normal operation of the software. The vulnerability requires local access (attack vector: local), low attack complexity, no privileges required, but does require user interaction (opening or processing the malicious CGM file). The CVSS v3.1 base score is 3.3, indicating a low severity primarily due to limited impact (no confidentiality or integrity loss) and the need for user interaction. No known exploits are currently reported in the wild. Siemens has not yet published patch links, but affected versions are clearly identified, and upgrading to the fixed versions is implied as the remediation path. This vulnerability impacts environments where Siemens JT2Go or Teamcenter Visualization are used to view or manipulate CGM files, which are common in engineering and manufacturing workflows.
Potential Impact
For European organizations, especially those in manufacturing, automotive, aerospace, and industrial engineering sectors that rely on Siemens JT2Go and Teamcenter Visualization for CAD and visualization tasks, this vulnerability could cause operational disruptions. A successful exploitation leads to application crashes, potentially interrupting design review sessions, collaboration, or automated visualization workflows. Although the impact is limited to denial of service without data compromise, repeated crashes could degrade productivity and cause delays in critical engineering processes. In environments with strict uptime requirements or where these tools are integrated into larger PLM (Product Lifecycle Management) systems, the DoS could have cascading effects. However, since exploitation requires user interaction and local access, the risk of widespread remote exploitation is low. The absence of known active exploits further reduces immediate risk but does not eliminate the need for vigilance. Organizations handling sensitive intellectual property should also consider the indirect risks of disruption to their design and visualization pipelines.
Mitigation Recommendations
European organizations should prioritize upgrading affected Siemens JT2Go and Teamcenter Visualization software to the fixed versions (JT2Go V14.3.0.6 or later, Teamcenter Visualization V13.3.0.13, V14.1.0.12, V14.2.0.9, or V14.3.0.6 and above). Until patches are applied, organizations should implement strict controls on CGM file sources, including validating and sanitizing files before opening them in vulnerable applications. User training is critical to avoid opening CGM files from untrusted or unknown sources. Employ application whitelisting and endpoint protection to detect and prevent anomalous application crashes. Network segmentation can limit exposure of vulnerable systems. Monitoring application logs for crashes related to CGM file processing can help detect attempted exploitation. Additionally, Siemens customers should stay updated with vendor advisories for official patches or workarounds. For environments where these tools are critical, consider deploying them in isolated or sandboxed environments to minimize impact from potential crashes.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Sweden, Belgium, Czech Republic, Poland
CVE-2023-51744: CWE-476: NULL Pointer Dereference in Siemens JT2Go
Description
A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.
AI-Powered Analysis
Technical Analysis
CVE-2023-51744 is a vulnerability identified in Siemens JT2Go and multiple versions of Teamcenter Visualization software prior to specific patch versions (JT2Go versions before 14.3.0.6, Teamcenter Visualization versions before 13.3.0.13, 14.1.0.12, 14.2.0.9, and 14.3.0.6). The vulnerability is classified as CWE-476, a NULL Pointer Dereference issue, which occurs during the parsing of specially crafted CGM (Computer Graphics Metafile) files. When the affected applications process these maliciously crafted CGM files, they dereference a NULL pointer, leading to an application crash. This crash results in a denial of service (DoS) condition, disrupting normal operation of the software. The vulnerability requires local access (attack vector: local), low attack complexity, no privileges required, but does require user interaction (opening or processing the malicious CGM file). The CVSS v3.1 base score is 3.3, indicating a low severity primarily due to limited impact (no confidentiality or integrity loss) and the need for user interaction. No known exploits are currently reported in the wild. Siemens has not yet published patch links, but affected versions are clearly identified, and upgrading to the fixed versions is implied as the remediation path. This vulnerability impacts environments where Siemens JT2Go or Teamcenter Visualization are used to view or manipulate CGM files, which are common in engineering and manufacturing workflows.
Potential Impact
For European organizations, especially those in manufacturing, automotive, aerospace, and industrial engineering sectors that rely on Siemens JT2Go and Teamcenter Visualization for CAD and visualization tasks, this vulnerability could cause operational disruptions. A successful exploitation leads to application crashes, potentially interrupting design review sessions, collaboration, or automated visualization workflows. Although the impact is limited to denial of service without data compromise, repeated crashes could degrade productivity and cause delays in critical engineering processes. In environments with strict uptime requirements or where these tools are integrated into larger PLM (Product Lifecycle Management) systems, the DoS could have cascading effects. However, since exploitation requires user interaction and local access, the risk of widespread remote exploitation is low. The absence of known active exploits further reduces immediate risk but does not eliminate the need for vigilance. Organizations handling sensitive intellectual property should also consider the indirect risks of disruption to their design and visualization pipelines.
Mitigation Recommendations
European organizations should prioritize upgrading affected Siemens JT2Go and Teamcenter Visualization software to the fixed versions (JT2Go V14.3.0.6 or later, Teamcenter Visualization V13.3.0.13, V14.1.0.12, V14.2.0.9, or V14.3.0.6 and above). Until patches are applied, organizations should implement strict controls on CGM file sources, including validating and sanitizing files before opening them in vulnerable applications. User training is critical to avoid opening CGM files from untrusted or unknown sources. Employ application whitelisting and endpoint protection to detect and prevent anomalous application crashes. Network segmentation can limit exposure of vulnerable systems. Monitoring application logs for crashes related to CGM file processing can help detect attempted exploitation. Additionally, Siemens customers should stay updated with vendor advisories for official patches or workarounds. For environments where these tools are critical, consider deploying them in isolated or sandboxed environments to minimize impact from potential crashes.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2023-12-22T11:30:22.671Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f5a1b0bd07c3938ab84
Added to database: 6/10/2025, 6:54:18 PM
Last enriched: 7/10/2025, 11:16:19 PM
Last updated: 8/15/2025, 1:12:22 AM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.