CVE-2021-44000

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through an out-of-bounds write in Siemens JT2Go, Solid Edge, and Teamcenter Visualization software when parsing malicious PAR files. An attacker could execute arbitrary code with the privileges of the current user. Affected users include those running vulnerable versions of these Siemens CAD/PLM applications.

💻 Affected Systems

Products:
  • JT2Go
  • Solid Edge SE2021
  • Solid Edge SE2022
  • Teamcenter Visualization V13.1
  • Teamcenter Visualization V13.2
  • Teamcenter Visualization V13.3
Versions: All versions before JT2Go V13.2.0.7, Solid Edge SE2021 before SE2021MP9, Solid Edge SE2022 before SE2022MP1, Teamcenter Visualization V13.1 before V13.1.0.9, V13.2 before V13.2.0.7, V13.3 before V13.3.0.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in plmxmlAdapterSE70.dll which is used for parsing PAR files. All default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or application compromise when a user opens a malicious PAR file, potentially leading to data exfiltration or further attacks.

🟢

If Mitigated

Limited impact if proper application whitelisting and file validation are in place, though the vulnerability still presents a risk.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires user interaction (opening a file), these applications are often used with internet-sourced CAD files.
🏢 Internal Only: HIGH - These engineering applications are commonly deployed in internal networks where malicious files could be introduced via email or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious PAR file. No public exploit code is available, but the vulnerability is well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: JT2Go V13.2.0.7, Solid Edge SE2021 MP9, Solid Edge SE2022 MP1, Teamcenter Visualization V13.1.0.9, V13.2.0.7, V13.3.0.1

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-301589.pdf

Restart Required: Yes

Instructions:

1. Download the latest version from Siemens support portal. 2. Backup current installation. 3. Run the installer with administrative privileges. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Block PAR file extensions

windows

Prevent execution of PAR files through application control or file blocking

Using Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: Path: *.par, Security Level: Disallowed

Disable plmxmlAdapterSE70.dll

windows

Remove or restrict access to the vulnerable DLL

takeown /f "C:\Program Files\Siemens\[application]\plmxmlAdapterSE70.dll"
icacls "C:\Program Files\Siemens\[application]\plmxmlAdapterSE70.dll" /deny Everyone:(F)

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized applications
  • Educate users to never open PAR files from untrusted sources and implement email filtering for PAR attachments

🔍 How to Verify

Check if Vulnerable:

Check the installed version of affected Siemens applications against the vulnerable version ranges

Check Version:

For JT2Go: Check Help > About. For Solid Edge: Check Help > About Solid Edge. For Teamcenter Visualization: Check Help > About

Verify Fix Applied:

Verify the application version matches or exceeds the patched versions listed in the fix section

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in Siemens CAD applications
  • Unexpected process creation from Siemens applications
  • Access violations in application event logs

Network Indicators:

  • Unusual outbound connections from engineering workstations
  • PAR file downloads to engineering systems

SIEM Query:

EventID=1000 OR EventID=1001 AND SourceName="Application Error" AND ProcessName contains "jt2go" OR "solid edge" OR "teamcenter"

🔗 References

📤 Share & Export