Siemens this week informed customers that some of its product development solutions are affected by a total of nearly two dozen vulnerabilities that can be exploited for arbitrary code execution using malicious files.
The security holes were discovered by a couple of researchers and their disclosure was coordinated through Trend Micro’s Zero Day Initiative (ZDI) and the U.S. Cybersecurity and Infrastructure Security Agency (CISA), which published their own advisories. The impacted products are all developed by Siemens Digital Industries Software, which specializes in product lifecycle management (PLM) solutions.
Siemens and CISA have published one advisory for 18 vulnerabilities affecting Siemens JT2Go, a 3D viewing tool for JT data (ISO-standardized 3D data format), and Teamcenter Visualization, which provides organizations visualization solutions for documents, 2D drawings and 3D models.
A second advisory was published for six vulnerabilities affecting Siemens Solid Edge, a solution that provides software tools for 3D design, simulation and manufacturing. A couple of the vulnerabilities described in each advisory overlap.
A vast majority of the vulnerabilities are high-severity issues that can result in arbitrary code execution in the context of the targeted process. One vulnerability can lead to information disclosure and it has been classified as medium severity.
The code execution flaws are related to improper validation of user-supplied data when parsing certain types of files, which leads to a memory corruption vulnerability. In order to conduct an attack, the attacker needs to convince th ..