CVE-2024-34086

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted CGM files in Siemens JT2Go and Teamcenter Visualization software. An attacker could execute arbitrary code with the privileges of the current user. All users of affected versions are at risk.

💻 Affected Systems

Products:
  • JT2Go
  • Teamcenter Visualization V14.1
  • Teamcenter Visualization V14.2
  • Teamcenter Visualization V14.3
  • Teamcenter Visualization V2312
Versions: All versions before V2312.0001 for JT2Go and V2312; before V14.1.0.13 for V14.1; before V14.2.0.10 for V14.2; before V14.3.0.7 for V14.3
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default installations when parsing CGM files. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or system compromise when a user opens a malicious CGM file, potentially leading to malware installation.

🟢

If Mitigated

Limited impact if file execution is blocked at perimeter or users have restricted privileges, though data exposure remains possible.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious file, but could be delivered via web downloads or email attachments.
🏢 Internal Only: HIGH - Internal users frequently exchange CAD files, making social engineering attacks effective within organizations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious CGM file. No authentication bypass needed but social engineering required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2312.0001 for JT2Go and V2312; V14.1.0.13 for V14.1; V14.2.0.10 for V14.2; V14.3.0.7 for V14.3

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-661579.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Siemens support portal. 2. Backup current installation. 3. Run the installer with administrative privileges. 4. Restart the system. 5. Verify the new version is installed.

🔧 Temporary Workarounds

Block CGM file extensions

all

Prevent execution of CGM files at email gateways and web proxies

Restrict user privileges

windows

Run affected software with limited user accounts to reduce impact

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized executables
  • Use network segmentation to isolate CAD workstations from critical systems

🔍 How to Verify

Check if Vulnerable:

Check Help > About in JT2Go or Teamcenter Visualization and compare version numbers against affected ranges

Check Version:

Not applicable - check via application GUI Help > About menu

Verify Fix Applied:

Confirm version number matches or exceeds patched versions listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening CGM files
  • Unusual process creation from JT2Go or Teamcenter processes

Network Indicators:

  • Downloads of CGM files from untrusted sources
  • Outbound connections from CAD workstations to suspicious IPs

SIEM Query:

Process Creation where ParentImage contains 'jt2go' OR ParentImage contains 'vis' AND CommandLine contains unusual parameters

🔗 References

📤 Share & Export