CVE-2023-38682

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted TIFF files in Siemens JT2Go and Teamcenter Visualization software. An attacker could execute arbitrary code in the context of the current process by exploiting an out-of-bounds read vulnerability. Users of affected versions of these Siemens CAD visualization tools are at risk.

💻 Affected Systems

Products:
  • JT2Go
  • Teamcenter Visualization V13.2
  • Teamcenter Visualization V14.1
  • Teamcenter Visualization V14.2
Versions: JT2Go: All versions < V14.2.0.5; Teamcenter Visualization V13.2: All versions < V13.2.0.14; Teamcenter Visualization V14.1: All versions < V14.1.0.10; Teamcenter Visualization V14.2: All versions < V14.2.0.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when parsing TIFF files, which these applications handle by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running the vulnerable application, potentially leading to data theft, lateral movement, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or remote code execution when users open malicious TIFF files, potentially leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact with proper application sandboxing, file type restrictions, and user awareness preventing malicious file execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious TIFF file, but no authentication is needed once the file is processed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: JT2Go: V14.2.0.5; Teamcenter Visualization V13.2: V13.2.0.14; Teamcenter Visualization V14.1: V14.1.0.10; Teamcenter Visualization V14.2: V14.2.0.5

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-131450.pdf

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Siemens support portal. 2. Backup current installation. 3. Run the installer with administrative privileges. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict TIFF file processing

windows

Configure applications to not process TIFF files or implement file type restrictions.

Application sandboxing

all

Run vulnerable applications in restricted environments or virtual machines.

🧯 If You Can't Patch

  • Implement strict file type filtering to block TIFF files at email gateways and network perimeters.
  • Train users to avoid opening TIFF files from untrusted sources and implement application whitelisting.

🔍 How to Verify

Check if Vulnerable:

Check application version in Help > About menu or via Windows Programs and Features.

Check Version:

For JT2Go: Check Help > About; For Teamcenter Visualization: Check application properties or registry at HKEY_LOCAL_MACHINE\SOFTWARE\Siemens\Teamcenter Visualization

Verify Fix Applied:

Verify installed version matches or exceeds patched versions listed in affected_systems.versions.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing TIFF files
  • Unexpected process creation from JT2Go or Teamcenter Visualization processes

Network Indicators:

  • TIFF file downloads to systems running vulnerable software
  • Outbound connections from visualization software to unexpected destinations

SIEM Query:

Process Creation where (Image contains 'jt2go' OR Image contains 'vis') AND (CommandLine contains '.tif' OR CommandLine contains '.tiff')

🔗 References

📤 Share & Export