Skip to main content

CVE-2023-51745: CWE-121: Stack-based Buffer Overflow in Siemens JT2Go

High
VulnerabilityCVE-2023-51745cvecve-2023-51745cwe-121
Published: Tue Jan 09 2024 (01/09/2024, 10:00:17 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: JT2Go

Description

A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a stack overflow vulnerability while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.

AI-Powered Analysis

AILast updated: 07/04/2025, 08:28:02 UTC

Technical Analysis

CVE-2023-51745 is a high-severity stack-based buffer overflow vulnerability (CWE-121) affecting Siemens JT2Go and multiple versions of Teamcenter Visualization software prior to specified patch levels (JT2Go versions before 14.3.0.6, Teamcenter Visualization versions before 13.3.0.13, 14.1.0.12, 14.2.0.9, and 14.3.0.6). The vulnerability arises during the parsing of specially crafted CGM (Computer Graphics Metafile) files, where improper bounds checking leads to a stack overflow condition. This flaw enables an attacker to execute arbitrary code within the context of the affected process. The CVSS v3.1 base score is 7.8, indicating a high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning successful exploitation could lead to full system compromise. The exploitability is partially mitigated by the requirement for local access and user interaction, but the vulnerability remains critical in environments where untrusted CGM files might be opened by users. No known exploits in the wild have been reported yet, and Siemens has not provided direct patch links in the provided data, but fixed versions are indicated. This vulnerability is particularly concerning for organizations using Siemens JT2Go or Teamcenter Visualization for CAD and visualization workflows, as it could be leveraged to execute malicious code, potentially leading to data theft, sabotage, or lateral movement within networks.

Potential Impact

For European organizations, the impact of CVE-2023-51745 is significant, especially those in manufacturing, engineering, automotive, aerospace, and industrial sectors where Siemens JT2Go and Teamcenter Visualization products are widely used for product lifecycle management and visualization. Exploitation could lead to unauthorized code execution, resulting in intellectual property theft, disruption of design and manufacturing processes, and potential sabotage of critical industrial workflows. Given the high confidentiality and integrity impact, sensitive design data and proprietary information could be compromised or altered, affecting product quality and competitive advantage. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, as targeted phishing or social engineering attacks could trick users into opening malicious CGM files. Additionally, compromised endpoints could serve as footholds for further network intrusion. The availability impact also raises concerns about potential denial of service or operational disruption. Overall, this vulnerability poses a substantial risk to European organizations relying on Siemens visualization tools, potentially affecting business continuity and regulatory compliance related to data protection and industrial security.

Mitigation Recommendations

1. Immediate upgrade to the fixed versions of JT2Go (≥14.3.0.6) and Teamcenter Visualization (≥13.3.0.13, 14.1.0.12, 14.2.0.9, 14.3.0.6) as provided by Siemens to eliminate the vulnerability. 2. Implement strict file handling policies to restrict opening CGM files only from trusted sources. 3. Deploy endpoint protection solutions capable of detecting and blocking exploitation attempts targeting buffer overflow vulnerabilities. 4. Conduct user awareness training focusing on the risks of opening untrusted files, especially CGM files, to reduce the likelihood of successful social engineering. 5. Employ application whitelisting and sandboxing techniques for JT2Go and Teamcenter Visualization to limit the impact of potential exploitation. 6. Monitor logs and network traffic for unusual behavior indicative of exploitation attempts or lateral movement. 7. Coordinate with Siemens support and subscribe to their security advisories for timely updates and patches. 8. Consider network segmentation to isolate systems running vulnerable Siemens software from critical infrastructure and sensitive data repositories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2023-12-22T11:30:22.671Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0a31182aa0cae27f6eeb

Added to database: 6/3/2025, 2:44:01 PM

Last enriched: 7/4/2025, 8:28:02 AM

Last updated: 8/11/2025, 10:37:37 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats