CVE-2021-34328

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by exploiting a heap buffer overflow in Siemens JT2Go, Solid Edge SE2021, and Teamcenter Visualization software. The flaw exists in the plmxmlAdapterSE70.dll library which fails to properly validate PAR file data, enabling out-of-bounds writes. Organizations using these Siemens CAD/visualization products are affected.

💻 Affected Systems

Products:
  • JT2Go
  • Solid Edge SE2021
  • Teamcenter Visualization
Versions: JT2Go < V13.2, Solid Edge SE2021 < SE2021MP5, Teamcenter Visualization < V13.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable when processing PAR files through the plmxmlAdapterSE70.dll library.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution with the privileges of the current process, potentially leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or remote code execution when users open malicious PAR files, potentially leading to lateral movement within networks.

🟢

If Mitigated

Limited impact with proper application whitelisting, file validation, and user privilege restrictions in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious PAR files. No public exploit code is available, but the vulnerability is well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: JT2Go V13.2+, Solid Edge SE2021 MP5+, Teamcenter Visualization V13.2+

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf

Restart Required: Yes

Instructions:

1. Download patches from Siemens support portal. 2. Apply updates to affected products. 3. Restart systems. 4. Verify version numbers match patched versions.

🔧 Temporary Workarounds

Block PAR file extensions

windows

Prevent processing of potentially malicious PAR files by blocking the file extension at network or host level.

Restrict user privileges

windows

Run affected applications with minimal user privileges to limit potential damage from exploitation.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use network segmentation to isolate CAD/visualization systems from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check installed version numbers against affected ranges: JT2Go < V13.2, Solid Edge SE2021 < SE2021MP5, Teamcenter Visualization < V13.2

Check Version:

Check application 'About' dialog or use Windows Programs and Features to verify installed versions

Verify Fix Applied:

Confirm version numbers match or exceed patched versions: JT2Go V13.2+, Solid Edge SE2021 MP5+, Teamcenter Visualization V13.2+

📡 Detection & Monitoring

Log Indicators:

  • Application crashes related to plmxmlAdapterSE70.dll
  • Unexpected process creation from CAD/visualization applications
  • Failed attempts to load or parse PAR files

Network Indicators:

  • Unusual network connections originating from CAD workstations
  • File transfers of PAR files to/from CAD systems

SIEM Query:

Process creation events where parent process is JT2Go.exe, SolidEdge.exe, or Teamcenter Visualization executables

🔗 References

📤 Share & Export