CVE-2023-38071

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through heap-based buffer overflow when parsing malicious WRL files in Siemens JT2Go, Teamcenter Visualization, and Tecnomatix Plant Simulation software. Attackers could execute arbitrary code with the privileges of the current process. Organizations using these Siemens industrial software products are affected.

💻 Affected Systems

Products:
  • JT2Go
  • Teamcenter Visualization
  • Tecnomatix Plant Simulation
Versions: JT2Go: All versions < V14.3.0.1; Teamcenter Visualization: V13.3 < V13.3.0.12, V14.0 all versions, V14.1 < V14.1.0.11, V14.2 < V14.2.0.6, V14.3 < V14.3.0.1; Tecnomatix Plant Simulation: V2201 < V2201.0010, V2302 < V2302.0004
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing specially crafted WRL files. All default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary code, install malware, pivot to other systems, or disrupt industrial operations.

🟠

Likely Case

Local privilege escalation or remote code execution leading to data theft, ransomware deployment, or industrial espionage.

🟢

If Mitigated

Limited impact if proper network segmentation, file validation, and least privilege principles are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open malicious WRL file. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: JT2Go: V14.3.0.1; Teamcenter Visualization: V13.3.0.12, V14.1.0.11, V14.2.0.6, V14.3.0.1; Tecnomatix Plant Simulation: V2201.0010, V2302.0004

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf

Restart Required: Yes

Instructions:

1. Download latest version from Siemens support portal. 2. Backup current installation. 3. Run installer with administrative privileges. 4. Restart system after installation completes.

🔧 Temporary Workarounds

Block WRL file extensions

windows

Prevent execution of WRL files through application whitelisting or file blocking

Using Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: Path: *.wrl, Security Level: Disallowed

Disable WRL file association

windows

Remove default program association for WRL files

reg delete "HKEY_CLASSES_ROOT\.wrl" /f
reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wrl" /f

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from critical networks
  • Apply principle of least privilege to user accounts running vulnerable software

🔍 How to Verify

Check if Vulnerable:

Check installed version against affected versions list. Open software and check Help > About or version information.

Check Version:

wmic product where "name like '%JT2Go%' or name like '%Teamcenter%' or name like '%Tecnomatix%'" get name, version

Verify Fix Applied:

Verify version number matches or exceeds patched versions listed in fix_official section.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected process creation from vulnerable applications
  • Failed attempts to open WRL files

Network Indicators:

  • Unusual outbound connections from affected software
  • File transfers containing WRL extensions

SIEM Query:

source="application_logs" AND (process_name="jt2go.exe" OR process_name="tcvis.exe") AND (event_id="1000" OR event_id="1001")

🔗 References

📤 Share & Export