logo
DATABASE RESOURCES PRICING ABOUT US

Siemens JT2Go and Teamcenter Visualization (Update B)

Description

## 1\. EXECUTIVE SUMMARY * **CVSS v3 7.8** * **ATTENTION:** Low skill level to exploit * **Vendor:** Siemens * **Equipment: **JT2Go and Teamcenter Visualization **\--------- Begin Update B Part 1 of 2 ---------** * **Vulnerabilities: **Type Confusion, Improper Restriction of XML External Entity Reference, Out-of-Bounds Write, Heap-based Buffer Overflow, Stack-based Buffer Overflow, ~~Untrusted Pointer Dereference~~, Out-of-Bounds Read **\--------- End Update B Part 1 of 2 ---------** ## 2\. UPDATE INFORMATION This updated advisory is a follow-up to the advisory update titled ICSA-21-012-03 Siemens JT2Go and Teamcenter Visualization (Update A) that was published February 9, 2021, to the ICS webpage on us-cert.cisa.gov. ## 3\. RISK EVALUATION Successful exploitation of these vulnerabilities could lead to arbitrary code execution. ## 4\. TECHNICAL DETAILS ### 4.1 AFFECTED PRODUCTS **\--------- Begin Update B Part 1 of 2 ---------** The following products are affected: * JT2Go: All versions prior to v13.1.0 * ~~JT2Go: Version 13.1.0. only affected by CVE-2020-26989, CVE-2020-26990, CVE-2020-26991~~ * Teamcenter Visualization: All versions prior to v13.1.0 * ~~Teamcenter Visualization: Version 13.1.0 only affected by CVE-2020-26989, CVE-2020-26990, CVE-2020-26991~~ ### 4.2 VULNERABILITY OVERVIEW [CVE-2020-26989](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26989>), [CVE-2020-26990](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26990>), and [CVE-2020-28383](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26383>) were moved to [SSA-663999](<https://www.siemens.com/cert/advisories>) and [ICSA-21-040-06](<https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06>). [CVE-2020-26991](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26991>) was moved to [SSA-695540](<https://cert-portal.siemens.com/productcert/pdf/ssa-695540.pdf>) and [ICSA-21-147-04](<https://us-cert.cisa.gov/ics/advisories/icsa-21-147-04>) **\--------- End Update B Part 2 of 2 ---------** #### 4.2.1 [ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (‘TYPE CONFUSION') CWE-843](<https://cwe.mitre.org/data/definitions/843.html>) Affected applications lack proper validation of user-supplied data when parsing JT files. A crafted JT file can trigger a type of confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26980](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26980>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). #### 4.2.2 [IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611](<https://cwe.mitre.org/data/definitions/611.html>) When opening a specially crafted XML file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external DTD. [CVE-2020-26981](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26981>) has been assigned to this vulnerability. A CVSS v3 base score of 5.6 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:L](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:L>)). #### 4.2.3 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>) Affected applications lack proper validation of user-supplied data when parsing CG4 and CGM files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26982](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26982>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). #### 4.2.4 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>) Affected applications lack proper validation of user-supplied data when parsing PDF files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26983](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26983>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). #### 4.2.5 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>) Affected applications lack proper validation of user-supplied data when parsing JT files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26984](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26984>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). #### 4.2.6 [HEAP-BASED BUFFER OVERFLOW CWE-122](<https://cwe.mitre.org/data/definitions/122.html>) Affected applications lack proper validation of user-supplied data when parsing RGB and SGI files. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26985](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26985>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). #### 4.2.7 [HEAP-BASED BUFFER OVERFLOW CWE-122](<https://cwe.mitre.org/data/definitions/122.html>) Affected applications lack proper validation of user-supplied data when parsing JT files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26986](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26986>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). #### 4.2.8 [HEAP-BASED BUFFER OVERFLOW CWE-122](<https://cwe.mitre.org/data/definitions/122.html>) Affected applications lack proper validation of user-supplied data when parsing TGA files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26987](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26987>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). #### 4.2.9 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>) Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26988](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26988>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). #### 4.2.10 [STACK-BASED BUFFER OVERFLOW CWE-121](<https://cwe.mitre.org/data/definitions/121.html>) Affected applications lack proper validation of user-supplied data when parsing CGM files. This could lead to a stack-based buffer overflow while trying to copy to a buffer during font string handling. An attacker could leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26992](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26992>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). #### 4.2.11 [STACK-BASED BUFFER OVERFLOW CWE-121](<https://cwe.mitre.org/data/definitions/121.html>) Affected applications lack proper validation of user-supplied data when parsing CGM files. This could lead to a stack-based buffer overflow while trying to copy to a buffer during font index handling. An attacker could leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26993](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26993>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). #### 4.2.12 [HEAP-BASED BUFFER OVERFLOW CWE-122](<https://cwe.mitre.org/data/definitions/122.html>) Affected applications lack proper validation of user-supplied data when parsing PCX files. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26994](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26994>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). #### 4.2.13 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>) Affected applications lack proper validation of user-supplied data when parsing SGI and RGB files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26995](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26995>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). #### 4.2.14 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>) Affected applications lack proper validation of user-supplied data when parsing CG4 files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. [CVE-2020-26996](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26996>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)). ### 4.3 BACKGROUND * **CRITICAL INFRASTRUCTURE SECTORS:** Critical Manufacturing * **COUNTRIES/AREAS DEPLOYED: **Worldwide * **COMPANY HEADQUARTERS LOCATION: **Germany ### 4.4 RESEARCHER Francis Provencher {PRL} and rgod, working with Trend Micro’s Zero Day Initiative, and Carsten Eiram from Risk Based Security, reported these vulnerabilities. ## 5\. MITIGATIONS Siemens recommends the following: * JT2Go: Update to [v13.1.0 or later](<https://support.sw.siemens.com/>) (login required). * Teamcenter Visualization: Update to [v13.1.0 or later](<https://support.sw.siemens.com/>) (login required). * Limit the opening of untrusted files in systems where JT2Go or Teamcenter Visualization is installed. * Apply a [defense-in-depth](<https://www.siemens.com/Industrialsecurity>) concept to help reduce the probability for untrusted code to run on the system. For additional information refer to [SSA-622830](<https://www.siemens.com/cert/advisories>), [SSA-663999](<https://www.siemens.com/cert/advisories>), and [SSA-695540](<https://cert-portal.siemens.com/productcert/pdf/ssa-695540.pdf>) Siemens strongly recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to [Siemens’ operational guidelines for Industrial Security](<https://www.siemens.com/cert/operational-guidelines%20industrial-security>) and follow the recommendations in the product manuals. Additional information on industrial security by Siemens can be found at: <https://www.siemens.com/Industrialsecurity> CISA recommends users take the following measures to protect themselves from social engineering attacks: * Do not click web links or open unsolicited attachments in email messages. * Refer to [Recognizing and Avoiding Email Scams](<https://us-cert.cisa.gov/sites/default/files/publications/emailscams_0905.pdf>) for more information on avoiding email scams. * Refer to [Avoiding Social Engineering and Phishing Attacks](<https://us-cert.cisa.gov/ncas/tips/ST04-014>) for more information on social engineering attacks. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for [control systems security recommended practices](<https://us-cert.cisa.gov/ics/recommended-practices>) on the ICS webpage on [us-cert.cisa.gov](<https://us-cert.cisa.gov/ics>). Several recommended practices are available for reading and download, including [Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies](<https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf>). Additional mitigation guidance and recommended practices are publicly available on the [ICS webpage on us-cert.cisa.gov](<https://us-cert.cisa.gov/ics>) in the Technical Information Paper, [ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies](<https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B>). Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents. No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely.


Related