CVE-2021-34326
📋 TL;DR
This vulnerability allows attackers to execute arbitrary code by exploiting a heap buffer overflow in Siemens JT2Go, Solid Edge SE2021, and Teamcenter Visualization software. It affects users who open malicious PAR files containing specially crafted data. The vulnerability exists in the plmxmlAdapterSE70.dll library which fails to properly validate user input.
💻 Affected Systems
- JT2Go
- Solid Edge SE2021
- Teamcenter Visualization
📦 What is this software?
Jt2go by Siemens
Solid Edge by Siemens
Solid Edge by Siemens
Solid Edge by Siemens
Solid Edge by Siemens
Solid Edge by Siemens
Solid Edge by Siemens
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with the same privileges as the current user, potentially leading to complete system compromise, data theft, or ransomware deployment.
Likely Case
Local privilege escalation or arbitrary code execution when a user opens a malicious PAR file, potentially leading to malware installation or data exfiltration.
If Mitigated
Limited impact with proper application sandboxing and user privilege restrictions, potentially only causing application crashes.
🎯 Exploit Status
Exploitation requires user interaction (opening a malicious PAR file) but the vulnerability is well-documented with a CVSS score of 7.8, making it attractive for targeted attacks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: JT2Go V13.2 or later, Solid Edge SE2021 MP5 or later, Teamcenter Visualization V13.2 or later
Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf
Restart Required: Yes
Instructions:
1. Download the latest version from Siemens support portal. 2. Backup current configuration. 3. Run the installer with administrative privileges. 4. Restart the system after installation completes.
🔧 Temporary Workarounds
Restrict PAR file handling
windowsBlock or restrict processing of PAR files through application settings or group policies
Application sandboxing
windowsRun affected applications in isolated environments or with reduced privileges
🧯 If You Can't Patch
- Implement strict file validation policies to block untrusted PAR files
- Use application whitelisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check application version in Help > About or via Windows Programs and Features
Check Version:
wmic product where name like "%JT2Go%" or name like "%Solid Edge%" or name like "%Teamcenter Visualization%" get name,version
Verify Fix Applied:
Verify installed version matches or exceeds patched versions: JT2Go >= V13.2, Solid Edge SE2021 >= MP5, Teamcenter Visualization >= V13.2
📡 Detection & Monitoring
Log Indicators:
- Application crashes with access violation errors
- Unexpected process creation from affected applications
- Suspicious file operations from plmxmlAdapterSE70.dll
Network Indicators:
- Unusual outbound connections from engineering workstations
- File downloads of PAR files from untrusted sources
SIEM Query:
EventID=1000 OR EventID=1001 AND SourceName contains "Application Error" AND ProcessName contains "jt2go" OR "solidedge" OR "teamcenter"
🔗 References
- https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf
- https://www.zerodayinitiative.com/advisories/ZDI-21-864/
- https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf
- https://www.zerodayinitiative.com/advisories/ZDI-21-864/