CVE-2023-38073

7.8 HIGH

📋 TL;DR

A type confusion vulnerability in Siemens JT2Go, Teamcenter Visualization, and Tecnomatix Plant Simulation allows remote code execution when parsing malicious WRL files. Attackers can execute arbitrary code with the privileges of the current process. Users of affected versions of these Siemens industrial software products are vulnerable.

💻 Affected Systems

Products:
  • JT2Go
  • Teamcenter Visualization
  • Tecnomatix Plant Simulation
Versions: JT2Go < V14.3.0.1; Teamcenter Visualization V13.3 < V13.3.0.12; Teamcenter Visualization V14.0 all versions; Teamcenter Visualization V14.1 < V14.1.0.11; Teamcenter Visualization V14.2 < V14.2.0.6; Teamcenter Visualization V14.3 < V14.3.0.1; Tecnomatix Plant Simulation V2201 < V2201.0010; Tecnomatix Plant Simulation V2302 < V2302.0004
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability is triggered when parsing WRL (VRML) files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution leading to data theft, ransomware deployment, or lateral movement within industrial networks.

🟠

Likely Case

Local privilege escalation or targeted attacks via malicious WRL files delivered through phishing or compromised websites.

🟢

If Mitigated

Limited impact if proper network segmentation, application whitelisting, and user privilege restrictions are implemented.

🌐 Internet-Facing: MEDIUM - While exploitation requires user interaction with malicious files, these applications are often used in industrial environments with internet connectivity.
🏢 Internal Only: HIGH - Industrial control systems using these applications are high-value targets for sophisticated attackers seeking operational disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious WRL file. No public exploit code is available, but the vulnerability is documented in ZDI-CAN-20826.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: JT2Go V14.3.0.1; Teamcenter Visualization V13.3.0.12; Teamcenter Visualization V14.1.0.11; Teamcenter Visualization V14.2.0.6; Teamcenter Visualization V14.3.0.1; Tecnomatix Plant Simulation V2201.0010; Tecnomatix Plant Simulation V2302.0004

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Siemens support portal. 2. Backup current installation. 3. Install the patch following vendor instructions. 4. Restart the system. 5. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Block WRL file extensions

all

Prevent execution of WRL files by blocking the file extension at the endpoint or network level.

Windows: Use Group Policy to block .wrl file execution
Linux: Modify /etc/mime.types to remove WRL associations

Application whitelisting

all

Restrict which applications can run WRL files to prevent unauthorized execution.

Windows: Use AppLocker or Windows Defender Application Control
Linux: Use SELinux or AppArmor policies

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from critical networks.
  • Apply principle of least privilege to user accounts running the vulnerable software.

🔍 How to Verify

Check if Vulnerable:

Check the installed version against affected versions list. Open the application and check Help > About or equivalent version information.

Check Version:

Windows: Check program properties or registry entries. Linux: Check package manager or application version command.

Verify Fix Applied:

Verify the version number matches or exceeds the patched versions listed in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening WRL files
  • Unexpected process creation from the affected applications
  • Failed file parsing attempts in application logs

Network Indicators:

  • Unusual outbound connections from affected systems
  • File downloads of WRL files from untrusted sources

SIEM Query:

source="application_logs" AND (process="jt2go.exe" OR process="teamcenter_visualization") AND (event="crash" OR event="file_open" AND file_extension="wrl")

🔗 References

📤 Share & Export