CVE-2023-51745: CWE-121: Stack-based Buffer Overflow in Siemens JT2Go
A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a stack overflow vulnerability while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.
AI Analysis
Technical Summary
CVE-2023-51745 is a high-severity stack-based buffer overflow vulnerability (CWE-121) affecting Siemens JT2Go and multiple versions of Teamcenter Visualization software prior to specified patch levels (JT2Go versions before 14.3.0.6, Teamcenter Visualization versions before 13.3.0.13, 14.1.0.12, 14.2.0.9, and 14.3.0.6). The vulnerability arises during the parsing of specially crafted CGM (Computer Graphics Metafile) files, where improper bounds checking leads to a stack overflow condition. This flaw enables an attacker to execute arbitrary code within the context of the affected process. The CVSS v3.1 base score is 7.8, indicating a high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning successful exploitation could lead to full system compromise. The exploitability is partially mitigated by the requirement for local access and user interaction, but the vulnerability remains critical in environments where untrusted CGM files might be opened by users. No known exploits in the wild have been reported yet, and Siemens has not provided direct patch links in the provided data, but fixed versions are indicated. This vulnerability is particularly concerning for organizations using Siemens JT2Go or Teamcenter Visualization for CAD and visualization workflows, as it could be leveraged to execute malicious code, potentially leading to data theft, sabotage, or lateral movement within networks.
Potential Impact
For European organizations, the impact of CVE-2023-51745 is significant, especially those in manufacturing, engineering, automotive, aerospace, and industrial sectors where Siemens JT2Go and Teamcenter Visualization products are widely used for product lifecycle management and visualization. Exploitation could lead to unauthorized code execution, resulting in intellectual property theft, disruption of design and manufacturing processes, and potential sabotage of critical industrial workflows. Given the high confidentiality and integrity impact, sensitive design data and proprietary information could be compromised or altered, affecting product quality and competitive advantage. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, as targeted phishing or social engineering attacks could trick users into opening malicious CGM files. Additionally, compromised endpoints could serve as footholds for further network intrusion. The availability impact also raises concerns about potential denial of service or operational disruption. Overall, this vulnerability poses a substantial risk to European organizations relying on Siemens visualization tools, potentially affecting business continuity and regulatory compliance related to data protection and industrial security.
Mitigation Recommendations
1. Immediate upgrade to the fixed versions of JT2Go (≥14.3.0.6) and Teamcenter Visualization (≥13.3.0.13, 14.1.0.12, 14.2.0.9, 14.3.0.6) as provided by Siemens to eliminate the vulnerability. 2. Implement strict file handling policies to restrict opening CGM files only from trusted sources. 3. Deploy endpoint protection solutions capable of detecting and blocking exploitation attempts targeting buffer overflow vulnerabilities. 4. Conduct user awareness training focusing on the risks of opening untrusted files, especially CGM files, to reduce the likelihood of successful social engineering. 5. Employ application whitelisting and sandboxing techniques for JT2Go and Teamcenter Visualization to limit the impact of potential exploitation. 6. Monitor logs and network traffic for unusual behavior indicative of exploitation attempts or lateral movement. 7. Coordinate with Siemens support and subscribe to their security advisories for timely updates and patches. 8. Consider network segmentation to isolate systems running vulnerable Siemens software from critical infrastructure and sensitive data repositories.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Sweden, Belgium, Poland, Czech Republic
CVE-2023-51745: CWE-121: Stack-based Buffer Overflow in Siemens JT2Go
Description
A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a stack overflow vulnerability while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.
AI-Powered Analysis
Technical Analysis
CVE-2023-51745 is a high-severity stack-based buffer overflow vulnerability (CWE-121) affecting Siemens JT2Go and multiple versions of Teamcenter Visualization software prior to specified patch levels (JT2Go versions before 14.3.0.6, Teamcenter Visualization versions before 13.3.0.13, 14.1.0.12, 14.2.0.9, and 14.3.0.6). The vulnerability arises during the parsing of specially crafted CGM (Computer Graphics Metafile) files, where improper bounds checking leads to a stack overflow condition. This flaw enables an attacker to execute arbitrary code within the context of the affected process. The CVSS v3.1 base score is 7.8, indicating a high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning successful exploitation could lead to full system compromise. The exploitability is partially mitigated by the requirement for local access and user interaction, but the vulnerability remains critical in environments where untrusted CGM files might be opened by users. No known exploits in the wild have been reported yet, and Siemens has not provided direct patch links in the provided data, but fixed versions are indicated. This vulnerability is particularly concerning for organizations using Siemens JT2Go or Teamcenter Visualization for CAD and visualization workflows, as it could be leveraged to execute malicious code, potentially leading to data theft, sabotage, or lateral movement within networks.
Potential Impact
For European organizations, the impact of CVE-2023-51745 is significant, especially those in manufacturing, engineering, automotive, aerospace, and industrial sectors where Siemens JT2Go and Teamcenter Visualization products are widely used for product lifecycle management and visualization. Exploitation could lead to unauthorized code execution, resulting in intellectual property theft, disruption of design and manufacturing processes, and potential sabotage of critical industrial workflows. Given the high confidentiality and integrity impact, sensitive design data and proprietary information could be compromised or altered, affecting product quality and competitive advantage. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, as targeted phishing or social engineering attacks could trick users into opening malicious CGM files. Additionally, compromised endpoints could serve as footholds for further network intrusion. The availability impact also raises concerns about potential denial of service or operational disruption. Overall, this vulnerability poses a substantial risk to European organizations relying on Siemens visualization tools, potentially affecting business continuity and regulatory compliance related to data protection and industrial security.
Mitigation Recommendations
1. Immediate upgrade to the fixed versions of JT2Go (≥14.3.0.6) and Teamcenter Visualization (≥13.3.0.13, 14.1.0.12, 14.2.0.9, 14.3.0.6) as provided by Siemens to eliminate the vulnerability. 2. Implement strict file handling policies to restrict opening CGM files only from trusted sources. 3. Deploy endpoint protection solutions capable of detecting and blocking exploitation attempts targeting buffer overflow vulnerabilities. 4. Conduct user awareness training focusing on the risks of opening untrusted files, especially CGM files, to reduce the likelihood of successful social engineering. 5. Employ application whitelisting and sandboxing techniques for JT2Go and Teamcenter Visualization to limit the impact of potential exploitation. 6. Monitor logs and network traffic for unusual behavior indicative of exploitation attempts or lateral movement. 7. Coordinate with Siemens support and subscribe to their security advisories for timely updates and patches. 8. Consider network segmentation to isolate systems running vulnerable Siemens software from critical infrastructure and sensitive data repositories.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2023-12-22T11:30:22.671Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0a31182aa0cae27f6eeb
Added to database: 6/3/2025, 2:44:01 PM
Last enriched: 7/4/2025, 8:28:02 AM
Last updated: 8/11/2025, 10:37:37 AM
Views: 13
Related Threats
CVE-2025-9026: OS Command Injection in D-Link DIR-860L
MediumCVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.