CVE-2023-33123

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted CGM files in Siemens JT2Go and Teamcenter Visualization software. An attacker could execute arbitrary code in the context of the current process by exploiting an out-of-bounds read vulnerability. Organizations using affected versions of these Siemens CAD visualization tools are at risk.

💻 Affected Systems

Products:
  • JT2Go
  • Teamcenter Visualization
Versions: JT2Go: All versions < V14.2.0.3; Teamcenter Visualization: V13.2 < V13.2.0.13, V13.3 < V13.3.0.10, V14.0 < V14.0.0.6, V14.1 < V14.1.0.8, V14.2 < V14.2.0.3
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable when processing CGM files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running the vulnerable application, potentially leading to data theft, lateral movement, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or arbitrary code execution when a user opens a malicious CGM file, potentially leading to data exfiltration or persistence establishment.

🟢

If Mitigated

Limited impact with proper application sandboxing, file type restrictions, and user privilege limitations preventing system-wide compromise.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires user interaction to open malicious files, internet-facing systems could be targeted through phishing or web-based file uploads.
🏢 Internal Only: HIGH - Internal users frequently exchange CAD files, making social engineering attacks with malicious CGM files highly effective within engineering environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious CGM file. No public exploit code has been identified as of the advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: JT2Go: V14.2.0.3; Teamcenter Visualization: V13.2.0.13, V13.3.0.10, V14.0.0.6, V14.1.0.8, V14.2.0.3

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-538795.pdf

Restart Required: Yes

Instructions:

1. Download the appropriate patched version from Siemens support portal. 2. Backup current installation and data. 3. Run the installer with administrative privileges. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict CGM file processing

all

Block or restrict processing of CGM files through application settings or group policies

Application sandboxing

all

Run vulnerable applications in restricted environments with limited privileges

🧯 If You Can't Patch

  • Implement strict file type validation and block untrusted CGM files at network perimeter
  • Train users to avoid opening CGM files from untrusted sources and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check the installed version in Help > About or via command line: 'jt2go --version' or equivalent for Teamcenter Visualization

Check Version:

jt2go --version (Linux) or check program properties (Windows)

Verify Fix Applied:

Verify the version number matches or exceeds the patched versions listed in the vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing CGM files
  • Unusual process creation from JT2Go or Teamcenter Visualization processes

Network Indicators:

  • Unexpected outbound connections from visualization software
  • CGM file downloads from untrusted sources

SIEM Query:

Process Creation where Parent Process contains 'jt2go' OR Parent Process contains 'vis' AND Command Line contains '.cgm'

🔗 References

📤 Share & Export