CVE-2023-38075

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in Siemens JT2Go, Teamcenter Visualization, and Tecnomatix Plant Simulation software. Attackers can exploit it by tricking users into opening malicious WRL files, potentially leading to arbitrary code execution. Organizations using these Siemens products for CAD/CAM/PLM workflows are affected.

💻 Affected Systems

Products:
  • JT2Go
  • Teamcenter Visualization
  • Tecnomatix Plant Simulation
Versions: JT2Go < V14.3.0.1; Teamcenter Visualization V13.3 < V13.3.0.12; Teamcenter Visualization V14.0 all versions; Teamcenter Visualization V14.1 < V14.1.0.11; Teamcenter Visualization V14.2 < V14.2.0.6; Teamcenter Visualization V14.3 < V14.3.0.1; Tecnomatix Plant Simulation V2201 < V2201.0010; Tecnomatix Plant Simulation V2302 < V2302.0004
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Exploitation requires user interaction to open malicious WRL files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the user running the vulnerable application, potentially leading to full system compromise, data theft, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or arbitrary code execution when a user opens a malicious WRL file, potentially leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact if proper application whitelisting, file type restrictions, and user privilege limitations are in place.

🌐 Internet-Facing: LOW - These applications are typically not directly internet-facing; exploitation requires user interaction with malicious files.
🏢 Internal Only: MEDIUM - Significant risk in engineering/manufacturing environments where these applications are commonly used and users frequently exchange CAD files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to deliver malicious WRL files and user interaction to open them. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: JT2Go V14.3.0.1; Teamcenter Visualization V13.3.0.12; Teamcenter Visualization V14.1.0.11; Teamcenter Visualization V14.2.0.6; Teamcenter Visualization V14.3.0.1; Tecnomatix Plant Simulation V2201.0010; Tecnomatix Plant Simulation V2302.0004

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Siemens Support Center. 2. Close all affected applications. 3. Install the patch with administrative privileges. 4. Restart the system. 5. Verify the updated version is installed.

🔧 Temporary Workarounds

Block WRL file extensions

windows

Prevent execution of WRL files through Group Policy or application control.

Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: Path: *.wrl, Security Level: Disallowed

Disable WRL file association

windows

Remove the association between WRL files and vulnerable applications.

reg delete "HKEY_CLASSES_ROOT\.wrl" /f
reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wrl" /f

🧯 If You Can't Patch

  • Implement application whitelisting to restrict execution to trusted applications only.
  • Train users to never open WRL files from untrusted sources and implement email filtering for suspicious attachments.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of affected Siemens software against the vulnerable version ranges listed in the affected_systems section.

Check Version:

For JT2Go: Check Help > About; For Teamcenter Visualization: Check Help > About; For Tecnomatix Plant Simulation: Check Help > About

Verify Fix Applied:

Verify the software version matches or exceeds the patched versions listed in fix_official.patch_version.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening WRL files
  • Unexpected process creation from vulnerable applications
  • Security event logs showing blocked execution attempts if application control is enabled

Network Indicators:

  • Unusual outbound connections from engineering workstations
  • File transfers of WRL files from untrusted sources

SIEM Query:

EventID=4688 AND (NewProcessName LIKE '%jt2go%' OR NewProcessName LIKE '%vis%') AND ParentProcessName LIKE '%explorer%' AND CommandLine LIKE '%.wrl%'

🔗 References

📤 Share & Export