CVE-2022-47936

7.8 HIGH

📋 TL;DR

This CVE describes a stack overflow vulnerability in Siemens JT Open, JT Utilities, and Parasolid software when parsing specially crafted JT files. An attacker could exploit this to execute arbitrary code with the privileges of the current process. All users of affected versions are vulnerable.

💻 Affected Systems

Products:
  • JT Open
  • JT Utilities
  • Parasolid V34.0
  • Parasolid V34.1
  • Parasolid V35.0
  • Parasolid V35.1
Versions: JT Open < V11.2.3.0, JT Utilities < V13.2.3.0, Parasolid V34.0 < V34.0.252, Parasolid V34.1 < V34.1.242, Parasolid V35.0 < V35.0.170, Parasolid V35.1 < V35.1.150
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations processing JT files are vulnerable. The vulnerability is in the file parsing functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or application crash leading to denial of service.

🟢

If Mitigated

Application crash without code execution if memory protections are enabled.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting a malicious JT file and convincing a user to open it. No authentication is required to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: JT Open V11.2.3.0, JT Utilities V13.2.3.0, Parasolid V34.0 V34.0.252, Parasolid V34.1 V34.1.242, Parasolid V35.0 V35.0.170, Parasolid V35.1 V35.1.150

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-836777.pdf

Restart Required: Yes

Instructions:

1. Download the updated version from Siemens support portal. 2. Install the update following vendor instructions. 3. Restart affected applications or systems.

🔧 Temporary Workarounds

Restrict JT file processing

all

Block or restrict processing of JT files from untrusted sources.

Application sandboxing

all

Run affected applications in sandboxed environments to limit impact.

🧯 If You Can't Patch

  • Implement strict file validation for JT files before processing.
  • Use application allowlisting to prevent unauthorized software execution.

🔍 How to Verify

Check if Vulnerable:

Check installed version against affected version ranges. Review application logs for crashes when processing JT files.

Check Version:

Check application about dialog or use vendor-specific version query commands.

Verify Fix Applied:

Confirm version is updated to patched versions listed above. Test with known safe JT files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening JT files
  • Memory access violation errors in logs
  • Unexpected process termination

Network Indicators:

  • Unexpected JT file downloads from untrusted sources
  • Outbound connections from affected applications after file processing

SIEM Query:

source="application_logs" AND (event="crash" OR event="access_violation") AND process="*JT*" OR process="*Parasolid*"

🔗 References

📤 Share & Export