CVE-2023-38070

CVSS 3.1 Score 7.8 of 10 (high)

Details

Published Sep 12, 2023
Updated: Jan 25, 2024
CWE ID 121
CWE ID 787

Summary

CVE-2023-38070 is a newly discovered vulnerability affecting multiple versions of JT2Go, Teamcenter Visualization, and Tecnomatix Plant Simulation. These applications are susceptible to stack-based buffer overflows when processing maliciously crafted WRL files. Successful exploitation of this weakness could enable an attacker to execute arbitrary code in the context of the affected process. Versions of JT2Go below V14.3.0.1, Teamcenter Visualization V13.3 below V13.3.0.12, Teamcenter Visualization V14.0, Teamcenter Visualization V14.1 below V14.1.0.11, Teamcenter Visualization V14.2 below V14.2.0.6, Teamcenter Visualization V14.3 below V14.3.0.1, Tecnomatix Plant Simulation V2201 below V2201.0010, and Tecnomatix Plant Simulation V2302 below V2302.0004 are vulnerable to this issue. (ZDI-CAN-20818) In simpler terms, several software applications, namely JT2Go, Teamcenter Visualization, and Tecnomatix Plant Simulation, have a flaw that allows attackers to overwrite the stack memory by manipulating WRL files in a specific way. This can lead to the execution of malicious code within the application, potentially compromising the system. Versions of these applications that are older than the specified versions are at risk. (ZDI-CAN-20818) A buffer overflow vulnerability, identified as CVE-2023-38070, has been discovered in JT2Go, Teamcenter Visualization, and Tecnomatix Plant Simulation. These applications are prone to stack-based buffer overflows when handling maliciously crafted WRL files. Successful exploitation could result in an attacker executing arbitrary code in the affected process, potentially leading to system compromise. Affected versions include all versions below V14.3.0.1 (JT2Go), V13.3.0.12 (Teamcenter Visualization), V14.0, V14.1.0.11 (Teamcenter Visualization), V14.2.0.6 (Teamcenter Visualization), V14.3.0.1 (Teamcenter Visualization), V2201.0010 (Tecnomatix Plant Simulation), and V2302.0004 (Tecnomatix Plant Simulation). (ZDI-CAN-20818) The cybersecurity community has identified a critical issue with multiple software applications, including JT2Go, Teamcenter Visualization, and Tecnomatix Plant Simulation. This vulnerability, assigned the CVE-2023-38070 identifier, is caused by a stack-based buffer overflow when processing WRL files. An attacker who successfully exploits this flaw can execute arbitrary code within the affected process, potentially leading to system compromise. Affected versions include JT2Go up to V14.3.0.1, Teamcenter Visualization up to V13.3.0.12, V14.0, V14.1.0.11, V14.2.0.6, V14.3.0.1, Tecnomatix Plant Simulation up to V2201.0010, and V2302.0004. (ZDI-CAN-20818) CVE-2023-38070 is a recently discovered vulnerability that impacts several software applications, including JT2Go, Teamcenter Visualization, and Tecnomatix Plant Simulation. The cause is a stack-based buffer overflow that occurs during the processing of WRL files. This weakness can enable an attacker to execute arbitrary code within the affected process, potentially compromising the system. Versions of these applications that are older than V14.3.0.1 (JT2Go), V13.3.0.12 (Teamcenter Visualization), V14.0, V14.1.0.11 (Teamcenter Visualization), V14.2.0.6 (Teamcenter Visualization), V14.3.0.1 (Teamcenter Visualization), V2201.0010 (Tecnomatix Plant Simulation), and V2302.0004 (Tecnomatix Plant Simulation) are at risk of exploitation. (ZDI-CAN-20818)

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Affected Products

  • Siemens Teamcenter Visualization
  • Siemens JT2GO
  • Teamcenter

Affected Vendors

  • Siemens AG

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-38070 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions