CVE-2024-26275

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted X_T files in Siemens JT2Go, Parasolid, and Teamcenter Visualization software. An attacker could execute arbitrary code in the context of the current process by exploiting an out-of-bounds read vulnerability. Organizations using affected versions of these Siemens CAD/visualization products are at risk.

💻 Affected Systems

Products:
  • JT2Go
  • Parasolid V35.1
  • Parasolid V36.0
  • Parasolid V36.1
  • Teamcenter Visualization V14.2
  • Teamcenter Visualization V14.3
  • Teamcenter Visualization V2312
Versions: JT2Go < V2312.0004; Parasolid V35.1 < V35.1.254; Parasolid V36.0 < V36.0.207; Parasolid V36.1 < V36.1.147; Teamcenter Visualization V14.2 < V14.2.0.12; Teamcenter Visualization V14.3 < V14.3.0.9; Teamcenter Visualization V2312 < V2312.0004
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable when processing X_T files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running the vulnerable application, potentially leading to data theft, lateral movement, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or arbitrary code execution on systems where users open malicious X_T files, potentially leading to data exfiltration or persistence establishment.

🟢

If Mitigated

Limited impact with proper application sandboxing, file validation, and user privilege restrictions preventing system-wide compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious X_T file. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: JT2Go V2312.0004; Parasolid V35.1 V35.1.254; Parasolid V36.0 V36.0.207; Parasolid V36.1 V36.1.147; Teamcenter Visualization V14.2 V14.2.0.12; Teamcenter Visualization V14.3 V14.3.0.9; Teamcenter Visualization V2312 V2312.0004

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-222019.html

Restart Required: Yes

Instructions:

1. Download the latest version from Siemens support portal. 2. Backup current installation. 3. Run the installer with administrative privileges. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict X_T file processing

all

Block or restrict processing of X_T files through application policies or file type restrictions

Application sandboxing

all

Run vulnerable applications in isolated environments or with reduced privileges

🧯 If You Can't Patch

  • Implement strict file validation for X_T files before opening
  • Use application allowlisting to prevent unauthorized software execution

🔍 How to Verify

Check if Vulnerable:

Check the installed version against affected version ranges in the application's About or Help menu

Check Version:

Application-specific: Typically found in Help > About or via Windows/Linux package manager queries

Verify Fix Applied:

Verify the installed version matches or exceeds the patched version numbers listed in the fix section

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing X_T files
  • Unusual process creation from CAD applications
  • Failed file parsing attempts

Network Indicators:

  • Unexpected outbound connections from CAD applications
  • File downloads of X_T files from untrusted sources

SIEM Query:

Process creation events from jt2go.exe, parasolid.exe, or teamcenter visualization executables followed by network connections or file writes

🔗 References

📤 Share & Export