CVE-2021-34326

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by exploiting a heap buffer overflow in Siemens JT2Go, Solid Edge SE2021, and Teamcenter Visualization software. It affects users who open malicious PAR files containing specially crafted data. The vulnerability exists in the plmxmlAdapterSE70.dll library which fails to properly validate user input.

💻 Affected Systems

Products:
  • JT2Go
  • Solid Edge SE2021
  • Teamcenter Visualization
Versions: All versions before JT2Go V13.2, Solid Edge SE2021 before SE2021MP5, Teamcenter Visualization before V13.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in the plmxmlAdapterSE70.dll library which is included by default in affected applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the same privileges as the current user, potentially leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or arbitrary code execution when a user opens a malicious PAR file, potentially leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only causing application crashes.

🌐 Internet-Facing: MEDIUM - While exploitation requires user interaction (opening a file), these applications are commonly used in engineering environments that may process files from external sources.
🏢 Internal Only: HIGH - Engineering and design teams frequently share PAR files internally, making social engineering attacks highly effective within organizations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious PAR file) but the vulnerability is well-documented with a CVSS score of 7.8, making it attractive for targeted attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: JT2Go V13.2 or later, Solid Edge SE2021 MP5 or later, Teamcenter Visualization V13.2 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf

Restart Required: Yes

Instructions:

1. Download the latest version from Siemens support portal. 2. Backup current configuration. 3. Run the installer with administrative privileges. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict PAR file handling

windows

Block or restrict processing of PAR files through application settings or group policies

Application sandboxing

windows

Run affected applications in isolated environments or with reduced privileges

🧯 If You Can't Patch

  • Implement strict file validation policies to block untrusted PAR files
  • Use application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check application version in Help > About or via Windows Programs and Features

Check Version:

wmic product where name like "%JT2Go%" or name like "%Solid Edge%" or name like "%Teamcenter Visualization%" get name,version

Verify Fix Applied:

Verify installed version matches or exceeds patched versions: JT2Go >= V13.2, Solid Edge SE2021 >= MP5, Teamcenter Visualization >= V13.2

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with access violation errors
  • Unexpected process creation from affected applications
  • Suspicious file operations from plmxmlAdapterSE70.dll

Network Indicators:

  • Unusual outbound connections from engineering workstations
  • File downloads of PAR files from untrusted sources

SIEM Query:

EventID=1000 OR EventID=1001 AND SourceName contains "Application Error" AND ProcessName contains "jt2go" OR "solidedge" OR "teamcenter"

🔗 References

📤 Share & Export