Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-26989 (GCVE-0-2020-26989)
Vulnerability from cvelistv5
- CWE-121 - Stack-based Buffer Overflow
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Siemens | JT2Go |
Version: All versions < V13.1.0.1 |
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T16:03:23.242Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-050/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "JT2Go",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V13.1.0.1"
}
]
},
{
"product": "Solid Edge SE2020",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All Versions \u003c SE2020MP12"
}
]
},
{
"product": "Solid Edge SE2021",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All Versions \u003c SE2021MP2"
}
]
},
{
"product": "Teamcenter Visualization",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V13.1.0.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Solid Edge SE2020 (All Versions \u003c SE2020MP12), Solid Edge SE2021 (All Versions \u003c SE2021MP2), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892)"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121: Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-19T13:51:24",
"orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"shortName": "siemens"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-050/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2020-26989",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "JT2Go",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V13.1.0.1"
}
]
}
},
{
"product_name": "Solid Edge SE2020",
"version": {
"version_data": [
{
"version_value": "All Versions \u003c SE2020MP12"
}
]
}
},
{
"product_name": "Solid Edge SE2021",
"version": {
"version_data": [
{
"version_value": "All Versions \u003c SE2021MP2"
}
]
}
},
{
"product_name": "Teamcenter Visualization",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V13.1.0.1"
}
]
}
}
]
},
"vendor_name": "Siemens"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Solid Edge SE2020 (All Versions \u003c SE2020MP12), Solid Edge SE2021 (All Versions \u003c SE2021MP2), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-121: Stack-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf",
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-050/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-050/"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"assignerShortName": "siemens",
"cveId": "CVE-2020-26989",
"datePublished": "2021-01-12T20:18:34",
"dateReserved": "2020-10-12T00:00:00",
"dateUpdated": "2024-08-04T16:03:23.242Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2020-26989\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2021-01-12T21:15:17.183\",\"lastModified\":\"2024-11-21T05:20:38.207\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Solid Edge SE2020 (All Versions \u003c SE2020MP12), Solid Edge SE2021 (All Versions \u003c SE2021MP2), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892)\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en JT2Go (Todas las versiones anteriores a V13.1.0.1), Solid Edge SE2020 (Todas las versiones anteriores a SE2020MP12), Solid Edge SE2021 (Todas las versiones anteriores a SE2021MP2), Teamcenter Visualization (Todas las versiones anteriores a V13.1.0.1). Las aplicaciones afectadas carecen de una comprobaci\u00f3n apropiada de los datos proporcionados por el usuario al analizar archivos PAR. Esto podr\u00eda resultar en un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria. Un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. (ZDI-CAN-11892)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.1.0.1\",\"matchCriteriaId\":\"4FB80DF8-5E85-4072-8999-02EDA895A112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"se2021\",\"matchCriteriaId\":\"576A303A-66CA-4694-AA54-9EB0137C24F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"39D237BD-EE55-4B40-ABC3-194C4BF7C6CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*\",\"matchCriteriaId\":\"49F5649A-349C-42C6-AFFF-CEE1ABC14E67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.1.0.1\",\"matchCriteriaId\":\"0EB3193F-54C0-4678-A22D-A98D2134F9E7\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-21-050/\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.zerodayinitiative.com/advisories/ZDI-21-050/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}"
}
}
icsa-21-012-04
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
},
{
"organization": "Trend Micro Zero Day Initiative",
"summary": "for coordinating disclosure"
},
{
"organization": "Industrial Control System Cyber Emergency Response Team (ICS-CERT)",
"summary": "for coordination efforts"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.",
"title": "General Recommendations"
},
{
"category": "general",
"text": "Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from a Siemens ProductCERT\u0027s advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-979834: Multiple vulnerabilities in Solid Edge - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-979834.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-012-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-012-04.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-012-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-012-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens Solid Edge",
"tracking": {
"current_release_date": "2021-01-15T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-21-012-04",
"initial_release_date": "2021-01-12T00:00:00.000000Z",
"revision_history": [
{
"date": "2021-01-12T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2021-01-15T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added additional fix version for SolidEdge SE2020"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSE2020MP12",
"product": {
"name": "Siemens Solid Edge SE2020: All Versions \u003c SE2020MP12",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2020"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSE2021MP2",
"product": {
"name": "Siemens Solid Edge SE2021: All Versions \u003c SE2021MP2",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2021"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28381",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends to limit opening of untrusted files from unknown sources in Solid Edge",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2020MP12 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2021MP2 or later",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28381"
},
{
"cve": "CVE-2020-28382",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends to limit opening of untrusted files from unknown sources in Solid Edge",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2020MP12 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2021MP2 or later",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28382"
},
{
"cve": "CVE-2020-28383",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends to limit opening of untrusted files from unknown sources in Solid Edge",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2020MP12 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2021MP2 or later",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28383"
},
{
"cve": "CVE-2020-28384",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends to limit opening of untrusted files from unknown sources in Solid Edge",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2020MP12 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2021MP2 or later",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28384"
},
{
"cve": "CVE-2020-28386",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends to limit opening of untrusted files from unknown sources in Solid Edge",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2020MP12 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2021MP2 or later",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28386"
},
{
"cve": "CVE-2020-26989",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends to limit opening of untrusted files from unknown sources in Solid Edge",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2020MP12 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2021MP2 or later",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-26989"
}
]
}
icsa-21-047-01
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
},
{
"organization": "Trend Micro Zero Day Initiative",
"summary": "coordinated disclosure"
},
{
"organization": "Open Design Alliance",
"summary": "coordination efforts"
},
{
"organization": "Cybersecurity and Infrastructure Security Agency (CISA)",
"summary": "coordination efforts"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"notes": [
{
"category": "summary",
"text": "Siemens has released version V13.1.0.1 for JT2Go and Teamcenter Visualization to fix multiple vulnerabilities that could be triggered when the products read files in different file formats (BMP, TIFF, CGM, TGA, PCT, HPG, PLT, RAS, PAR, ASM, DXF, DWG). If a user is tricked to opening of a malicious file with the affected products, this could lead to application crash, or potentially arbitrary code execution or data extraction on the target host system.\n\nSiemens recommends to update to the latest versions and to limit opening of untrusted files from unknown sources in the affected products.\n\nNotes:\n\n- Previous versions of this advisory incorrectly listed the following vulnerabilities as being fixed in V13.1.0.1: CVE-2020-26991, CVE-2020-26998, CVE-2020-26999, CVE-2020-27001 and CVE-2020-27002. Those were fixed in V13.1.0.2 and are therefore addressed in advisory SSA-695540 [0]\n\n- The vulnerability CVE-2020-28383 was incorrectly listed in SSA-622830 [1] as being fixed in V13.1.0.0. This was fixed in V13.1.0.1 and therefore added here\n\n- The Open Design Alliance [2] recently disclosed an additional vulnerability (CVE-2021-31784) which is also covered in this advisory\n\n[0] https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf\n\n[1] https://cert-portal.siemens.com/productcert/pdf/ssa-695540.pdf\n\n[2] https://www.opendesign.com/security-advisories",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-663999: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.1.0.1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-663999.json"
},
{
"category": "self",
"summary": "SSA-663999: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.1.0.1 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-663999.txt"
},
{
"category": "self",
"summary": "SSA-663999: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.1.0.1 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-047-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-047-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-047-01 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-047-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Open Design Alliance Drawings SDK (Update A)",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-21-047-01",
"initial_release_date": "2021-02-09T00:00:00.000000Z",
"revision_history": [
{
"date": "2021-02-09T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2021-05-17T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Removed the vulnerabilities CVE-2020-26991, CVE-2020-26998, CVE-2020-26999, CVE-2020-27001, CVE-2020-27002, and added CVE-2020-28383, CVE-2021-31784 for the reasons described in the Summary"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "3",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV13.1.0.1",
"product": {
"name": "JT2Go",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "JT2Go"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV13.1.0.1",
"product": {
"name": "Teamcenter Visualization",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26989",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-26989 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-26989 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-26989.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-26989"
},
{
"cve": "CVE-2020-26990",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing ASM files. A crafted ASM file could trigger a type confusion condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11897)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-26990 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-26990 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-26990.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-26990"
},
{
"cve": "CVE-2020-27000",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing BMP files. This can result in a memory corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12018)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27000 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27000 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27000.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27000"
},
{
"cve": "CVE-2020-27003",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing TIFF files. This could lead to pointer dereferences of a value obtained from untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12158)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27003 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27003 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27003.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27003"
},
{
"cve": "CVE-2020-27004",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of CGM files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12163)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27004 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27004 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27004.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27004"
},
{
"cve": "CVE-2020-27005",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of TGA files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12178)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27005 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27005 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27005.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27005"
},
{
"cve": "CVE-2020-27006",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of PCT files. This could result in a memory corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12182)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27006 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27006 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27006.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27006"
},
{
"cve": "CVE-2020-27007",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of HPG files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12207)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27007 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27007 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27007.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27007"
},
{
"cve": "CVE-2020-27008",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of PLT files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12209)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27008 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27008 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27008.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27008"
},
{
"cve": "CVE-2020-28383",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This can result in an out of bounds write past the memory location that is a read only image address. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11885)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-28383 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-28383 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-28383.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28383"
},
{
"cve": "CVE-2020-28394",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of RAS files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12283)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-28394 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-28394 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-28394.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28394"
},
{
"cve": "CVE-2021-25173",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which could allow attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart). (ZDI-CAN-12019)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-25173 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-25173 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25173.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-25173"
},
{
"cve": "CVE-2021-25174",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It could allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart). (ZDI-CAN-12026)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-25174 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-25174 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25174.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-25174"
},
{
"cve": "CVE-2021-25175",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Conversion issue exists when rendering malformed .DXF and .DWG files. This could allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). (ZDI-CAN-11912, ZDI-CAN-11993, ZDI-CAN-11988)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-25175 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-25175 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25175.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-25175"
},
{
"cve": "CVE-2021-25176",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A NULL pointer dereference exists when rendering malformed .DXF and .DWG files. This could allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). (ZDI-CAN-11913, ZDI-CAN-11989)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-25176 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-25176 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25176.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-25176"
},
{
"cve": "CVE-2021-25177",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Confusion issue exists when rendering malformed .DXF and .DWG files. (ZDI-CAN-11927)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-25177 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-25177 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25177.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-25177"
},
{
"cve": "CVE-2021-25178",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A stack-based buffer overflow vulnerability exists when the recover operation is run with malformed .DXF and .DWG files. (ZDI-CAN-11901, ZDI-CAN-12165, ZDI-CAN-12166)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-25178 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-25178 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25178.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-25178"
},
{
"cve": "CVE-2021-31784",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds write vulnerability exists in the file-reading procedure in Open Design Alliance Drawings SDK before 2021.6.\n\nThis could allow an attacker to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart) or possible code execution. (ZDI-CAN-11915)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-31784 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-31784 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-31784.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-31784"
}
]
}
ICSA-21-047-01
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
},
{
"organization": "Trend Micro Zero Day Initiative",
"summary": "coordinated disclosure"
},
{
"organization": "Open Design Alliance",
"summary": "coordination efforts"
},
{
"organization": "Cybersecurity and Infrastructure Security Agency (CISA)",
"summary": "coordination efforts"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"notes": [
{
"category": "summary",
"text": "Siemens has released version V13.1.0.1 for JT2Go and Teamcenter Visualization to fix multiple vulnerabilities that could be triggered when the products read files in different file formats (BMP, TIFF, CGM, TGA, PCT, HPG, PLT, RAS, PAR, ASM, DXF, DWG). If a user is tricked to opening of a malicious file with the affected products, this could lead to application crash, or potentially arbitrary code execution or data extraction on the target host system.\n\nSiemens recommends to update to the latest versions and to limit opening of untrusted files from unknown sources in the affected products.\n\nNotes:\n\n- Previous versions of this advisory incorrectly listed the following vulnerabilities as being fixed in V13.1.0.1: CVE-2020-26991, CVE-2020-26998, CVE-2020-26999, CVE-2020-27001 and CVE-2020-27002. Those were fixed in V13.1.0.2 and are therefore addressed in advisory SSA-695540 [0]\n\n- The vulnerability CVE-2020-28383 was incorrectly listed in SSA-622830 [1] as being fixed in V13.1.0.0. This was fixed in V13.1.0.1 and therefore added here\n\n- The Open Design Alliance [2] recently disclosed an additional vulnerability (CVE-2021-31784) which is also covered in this advisory\n\n[0] https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf\n\n[1] https://cert-portal.siemens.com/productcert/pdf/ssa-695540.pdf\n\n[2] https://www.opendesign.com/security-advisories",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-663999: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.1.0.1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-663999.json"
},
{
"category": "self",
"summary": "SSA-663999: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.1.0.1 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-663999.txt"
},
{
"category": "self",
"summary": "SSA-663999: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.1.0.1 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-047-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-047-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-047-01 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-047-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Open Design Alliance Drawings SDK (Update A)",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-21-047-01",
"initial_release_date": "2021-02-09T00:00:00.000000Z",
"revision_history": [
{
"date": "2021-02-09T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2021-05-17T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Removed the vulnerabilities CVE-2020-26991, CVE-2020-26998, CVE-2020-26999, CVE-2020-27001, CVE-2020-27002, and added CVE-2020-28383, CVE-2021-31784 for the reasons described in the Summary"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "3",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV13.1.0.1",
"product": {
"name": "JT2Go",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "JT2Go"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV13.1.0.1",
"product": {
"name": "Teamcenter Visualization",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Teamcenter Visualization"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26989",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-26989 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-26989 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-26989.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-26989"
},
{
"cve": "CVE-2020-26990",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing ASM files. A crafted ASM file could trigger a type confusion condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11897)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-26990 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-26990 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-26990.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-26990"
},
{
"cve": "CVE-2020-27000",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing BMP files. This can result in a memory corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12018)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27000 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27000 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27000.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27000"
},
{
"cve": "CVE-2020-27003",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing TIFF files. This could lead to pointer dereferences of a value obtained from untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12158)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27003 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27003 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27003.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27003"
},
{
"cve": "CVE-2020-27004",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of CGM files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12163)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27004 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27004 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27004.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27004"
},
{
"cve": "CVE-2020-27005",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of TGA files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12178)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27005 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27005 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27005.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27005"
},
{
"cve": "CVE-2020-27006",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of PCT files. This could result in a memory corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12182)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27006 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27006 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27006.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27006"
},
{
"cve": "CVE-2020-27007",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of HPG files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12207)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27007 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27007 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27007.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27007"
},
{
"cve": "CVE-2020-27008",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of PLT files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12209)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-27008 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-27008 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27008.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-27008"
},
{
"cve": "CVE-2020-28383",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This can result in an out of bounds write past the memory location that is a read only image address. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11885)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-28383 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-28383 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-28383.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28383"
},
{
"cve": "CVE-2020-28394",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing of RAS files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12283)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2020-28394 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2020-28394 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-28394.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28394"
},
{
"cve": "CVE-2021-25173",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which could allow attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart). (ZDI-CAN-12019)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-25173 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-25173 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25173.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-25173"
},
{
"cve": "CVE-2021-25174",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It could allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart). (ZDI-CAN-12026)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-25174 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-25174 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25174.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-25174"
},
{
"cve": "CVE-2021-25175",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Conversion issue exists when rendering malformed .DXF and .DWG files. This could allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). (ZDI-CAN-11912, ZDI-CAN-11993, ZDI-CAN-11988)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-25175 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-25175 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25175.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-25175"
},
{
"cve": "CVE-2021-25176",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A NULL pointer dereference exists when rendering malformed .DXF and .DWG files. This could allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). (ZDI-CAN-11913, ZDI-CAN-11989)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-25176 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-25176 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25176.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-25176"
},
{
"cve": "CVE-2021-25177",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Confusion issue exists when rendering malformed .DXF and .DWG files. (ZDI-CAN-11927)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-25177 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-25177 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25177.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-25177"
},
{
"cve": "CVE-2021-25178",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A stack-based buffer overflow vulnerability exists when the recover operation is run with malformed .DXF and .DWG files. (ZDI-CAN-11901, ZDI-CAN-12165, ZDI-CAN-12166)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-25178 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-25178 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25178.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-25178"
},
{
"cve": "CVE-2021-31784",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds write vulnerability exists in the file-reading procedure in Open Design Alliance Drawings SDK before 2021.6.\n\nThis could allow an attacker to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart) or possible code execution. (ZDI-CAN-11915)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"references": [
{
"summary": "CVE-2021-31784 - JT2Go",
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"summary": "CVE-2021-31784 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-31784.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html"
},
{
"category": "vendor_fix",
"details": "Update to V13.1.0.1 or later version",
"product_ids": [
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Avoid to open untrusted files from unknown sources in JT2Go and Teamcenter Visualization",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2021-31784"
}
]
}
ICSA-21-012-04
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
},
{
"organization": "Trend Micro Zero Day Initiative",
"summary": "for coordinating disclosure"
},
{
"organization": "Industrial Control System Cyber Emergency Response Team (ICS-CERT)",
"summary": "for coordination efforts"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.",
"title": "General Recommendations"
},
{
"category": "general",
"text": "Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from a Siemens ProductCERT\u0027s advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-979834: Multiple vulnerabilities in Solid Edge - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-979834.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-012-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-012-04.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-21-012-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-012-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens Solid Edge",
"tracking": {
"current_release_date": "2021-01-15T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-21-012-04",
"initial_release_date": "2021-01-12T00:00:00.000000Z",
"revision_history": [
{
"date": "2021-01-12T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2021-01-15T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added additional fix version for SolidEdge SE2020"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSE2020MP12",
"product": {
"name": "Siemens Solid Edge SE2020: All Versions \u003c SE2020MP12",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2020"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cSE2021MP2",
"product": {
"name": "Siemens Solid Edge SE2021: All Versions \u003c SE2021MP2",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2021"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28381",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends to limit opening of untrusted files from unknown sources in Solid Edge",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2020MP12 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2021MP2 or later",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28381"
},
{
"cve": "CVE-2020-28382",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends to limit opening of untrusted files from unknown sources in Solid Edge",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2020MP12 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2021MP2 or later",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28382"
},
{
"cve": "CVE-2020-28383",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends to limit opening of untrusted files from unknown sources in Solid Edge",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2020MP12 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2021MP2 or later",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28383"
},
{
"cve": "CVE-2020-28384",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends to limit opening of untrusted files from unknown sources in Solid Edge",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2020MP12 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2021MP2 or later",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28384"
},
{
"cve": "CVE-2020-28386",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends to limit opening of untrusted files from unknown sources in Solid Edge",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2020MP12 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2021MP2 or later",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-28386"
},
{
"cve": "CVE-2020-26989",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write into uninitialized memory. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends to limit opening of untrusted files from unknown sources in Solid Edge",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: https://www.siemens.com/industrialsecurity",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2020MP12 or later",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to Version SE2021MP2 or later",
"product_ids": [
"CSAFPID-0002"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002"
]
}
],
"title": "CVE-2020-26989"
}
]
}
cnvd-2021-02582
Vulnerability from cnvd
厂商已发布相关漏洞补丁链接,请及时更新: https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf
| Name | ['SIEMENS JT2Go V13.1.0', 'SIEMENS Teamcenter Visualization V13.1.0'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-26989"
}
},
"description": "JT2Go\u662f\u4e00\u4e2a3D JT\u67e5\u770b\u5de5\u5177\uff0c\u5141\u8bb8\u7528\u6237\u67e5\u770bJT\uff0cPDF\uff0cSolid Edge\uff0cPLM XML\u4e0e\u73b0\u6709\u7684JT\uff0c\nVFZ\u3001CGM\u3001TIF\u6570\u636e\u3002Teamcenter\u53ef\u89c6\u5316\u8f6f\u4ef6\u4f7f\u4f01\u4e1a\u80fd\u591f\u589e\u5f3a\u4ed6\u4eec\u7684\u4ea7\u54c1\u751f\u547d\u5468\u671f\u7ba1\u7406(PLM)\u73af\u5883\uff0c\u8be5\u8f6f\u4ef6\u4f7f\u4f01\u4e1a\u7528\u6237\u80fd\u591f\u5728\u5355\u4e00\u73af\u5883\u4e2d\u8bbf\u95ee\u6587\u6863\u30012D\u56fe\u7eb8\u548c3D\u6a21\u578b\u3002\n\nJT2Go and Teamcenter Visualization\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u5728\u5f53\u524d\u8fdb\u7a0b\u7684\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4ee3\u7801\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u76f8\u5173\u6f0f\u6d1e\u8865\u4e01\u94fe\u63a5\uff0c\u8bf7\u53ca\u65f6\u66f4\u65b0\uff1a\r\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-02582",
"openTime": "2021-01-13",
"patchDescription": "JT2Go\u662f\u4e00\u4e2a3D JT\u67e5\u770b\u5de5\u5177\uff0c\u5141\u8bb8\u7528\u6237\u67e5\u770bJT\uff0cPDF\uff0cSolid Edge\uff0cPLM XML\u4e0e\u73b0\u6709\u7684JT\uff0c\r\nVFZ\u3001CGM\u3001TIF\u6570\u636e\u3002Teamcenter\u53ef\u89c6\u5316\u8f6f\u4ef6\u4f7f\u4f01\u4e1a\u80fd\u591f\u589e\u5f3a\u4ed6\u4eec\u7684\u4ea7\u54c1\u751f\u547d\u5468\u671f\u7ba1\u7406(PLM)\u73af\u5883\uff0c\u8be5\u8f6f\u4ef6\u4f7f\u4f01\u4e1a\u7528\u6237\u80fd\u591f\u5728\u5355\u4e00\u73af\u5883\u4e2d\u8bbf\u95ee\u6587\u6863\u30012D\u56fe\u7eb8\u548c3D\u6a21\u578b\u3002\r\n\r\nJT2Go and Teamcenter Visualization\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u5728\u5f53\u524d\u8fdb\u7a0b\u7684\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "JT2Go and Teamcenter Visualization\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2021-02582\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"SIEMENS JT2Go V13.1.0",
"SIEMENS Teamcenter Visualization V13.1.0"
]
},
"referenceLink": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf",
"serverity": "\u9ad8",
"submitTime": "2021-01-13",
"title": "JT2Go and Teamcenter Visualization\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2021-02582\uff09"
}
gsd-2020-26989
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2020-26989",
"description": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Solid Edge SE2020 (All Versions \u003c SE2020MP12), Solid Edge SE2021 (All Versions \u003c SE2021MP2), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892)",
"id": "GSD-2020-26989"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-26989"
],
"details": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Solid Edge SE2020 (All Versions \u003c SE2020MP12), Solid Edge SE2021 (All Versions \u003c SE2021MP2), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892)",
"id": "GSD-2020-26989",
"modified": "2023-12-13T01:22:09.182984Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2020-26989",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "JT2Go",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V13.1.0.1"
}
]
}
},
{
"product_name": "Solid Edge SE2020",
"version": {
"version_data": [
{
"version_value": "All Versions \u003c SE2020MP12"
}
]
}
},
{
"product_name": "Solid Edge SE2021",
"version": {
"version_data": [
{
"version_value": "All Versions \u003c SE2021MP2"
}
]
}
},
{
"product_name": "Teamcenter Visualization",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V13.1.0.1"
}
]
}
}
]
},
"vendor_name": "Siemens"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Solid Edge SE2020 (All Versions \u003c SE2020MP12), Solid Edge SE2021 (All Versions \u003c SE2021MP2), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-121: Stack-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf",
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-050/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-050/"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.1.0.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "se2021",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.1.0.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2020-26989"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Solid Edge SE2020 (All Versions \u003c SE2020MP12), Solid Edge SE2021 (All Versions \u003c SE2021MP2), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-050/",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-050/"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-07-23T19:51Z",
"publishedDate": "2021-01-12T21:15Z"
}
}
}
ghsa-q58p-hm39-45gx
Vulnerability from github
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), JT2Go (V 13.1.0), Solid Edge (All Versions < SE2021MP2), Teamcenter Visualization (All Versions < V13.1.0), Teamcenter Visualization (V 13.1.0). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.
{
"affected": [],
"aliases": [
"CVE-2020-26989"
],
"database_specific": {
"cwe_ids": [
"CWE-121",
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-01-12T21:15:00Z",
"severity": "HIGH"
},
"details": "A vulnerability has been identified in JT2Go (All Versions \u003c V13.1.0), JT2Go (V 13.1.0), Solid Edge (All Versions \u003c SE2021MP2), Teamcenter Visualization (All Versions \u003c V13.1.0), Teamcenter Visualization (V 13.1.0). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.",
"id": "GHSA-q58p-hm39-45gx",
"modified": "2022-05-24T17:38:33Z",
"published": "2022-05-24T17:38:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26989"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"
},
{
"type": "WEB",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-050"
}
],
"schema_version": "1.4.0",
"severity": []
}
var-202101-0350
Vulnerability from variot
A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892). Several Siemens products are vulnerable to out-of-bounds writes. Zero Day Initiative To this vulnerability ZDI-CAN-11892 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,
VFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "solid edge",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "se2021"
},
{
"_id": null,
"model": "solid edge",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": "se2021"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "jt2go",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": "13.1.0.1"
},
{
"_id": null,
"model": "solid edge",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": null,
"trust": 0.7,
"vendor": "siemens",
"version": null
},
{
"_id": null,
"model": "jt2go",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
},
{
"_id": null,
"model": "teamcenter visualization",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "v13.1.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-050"
},
{
"db": "CNVD",
"id": "CNVD-2021-02582"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "NVD",
"id": "CVE-2020-26989"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-050"
}
],
"trust": 0.7
},
"cve": "CVE-2020-26989",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-26989",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2021-02582",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26989",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2020-26989",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-26989",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-26989",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-26989",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-26989",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2021-02582",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-848",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-050"
},
{
"db": "CNVD",
"id": "CNVD-2021-02582"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-848"
},
{
"db": "NVD",
"id": "CVE-2020-26989"
}
]
},
"description": {
"_id": null,
"data": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Solid Edge SE2020 (All Versions \u003c SE2020MP12), Solid Edge SE2021 (All Versions \u003c SE2021MP2), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892). Several Siemens products are vulnerable to out-of-bounds writes. Zero Day Initiative To this vulnerability ZDI-CAN-11892 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PAR files. JT2Go is a 3D JT viewing tool that allows users to view JT, PDF, Solid Edge, PLM XML and existing JT,\r\n\r\nVFZ, CGM, TIF data. Teamcenter visualization software enables companies to enhance their product lifecycle management (PLM) environment. The software enables corporate users to access documents, 2D drawings and 3D models in a single environment",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-26989"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "ZDI",
"id": "ZDI-21-050"
},
{
"db": "CNVD",
"id": "CNVD-2021-02582"
}
],
"trust": 2.79
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-26989",
"trust": 3.7
},
{
"db": "ZDI",
"id": "ZDI-21-050",
"trust": 3.1
},
{
"db": "SIEMENS",
"id": "SSA-622830",
"trust": 2.2
},
{
"db": "SIEMENS",
"id": "SSA-663999",
"trust": 1.6
},
{
"db": "SIEMENS",
"id": "SSA-979834",
"trust": 1.6
},
{
"db": "JVN",
"id": "JVNVU91685542",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11892",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-02582",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0125",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.0495",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-012-03",
"trust": 0.6
},
{
"db": "ICS CERT",
"id": "ICSA-21-040-06",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-848",
"trust": 0.6
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-050"
},
{
"db": "CNVD",
"id": "CNVD-2021-02582"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-848"
},
{
"db": "NVD",
"id": "CVE-2020-26989"
}
]
},
"id": "VAR-202101-0350",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02582"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-02582"
}
]
},
"last_update_date": "2024-11-23T21:31:23.872000Z",
"patch": {
"_id": null,
"data": [
{
"title": "SSA-979834",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"title": "Siemens has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"title": "Patch for JT2Go and Teamcenter Visualization heap buffer overflow vulnerability (CNVD-2021-02582)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/243982"
},
{
"title": "Siemens Jt2go and Teamcenter Visualization Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139359"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-050"
},
{
"db": "CNVD",
"id": "CNVD-2021-02582"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-848"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-121",
"trust": 1.0
},
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "NVD",
"id": "CVE-2020-26989"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-050/"
},
{
"trust": 2.2,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"trust": 1.6,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"trust": 1.6,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26989"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu91685542/"
},
{
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-040-06"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0495"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0125/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-050"
},
{
"db": "CNVD",
"id": "CNVD-2021-02582"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-848"
},
{
"db": "NVD",
"id": "CVE-2020-26989"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-050",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2021-02582",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015271",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-848",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-26989",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-050",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02582",
"ident": null
},
{
"date": "2021-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015271",
"ident": null
},
{
"date": "2021-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-848",
"ident": null
},
{
"date": "2021-01-12T21:15:17.183000",
"db": "NVD",
"id": "CVE-2020-26989",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-01-14T00:00:00",
"db": "ZDI",
"id": "ZDI-21-050",
"ident": null
},
{
"date": "2021-01-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-02582",
"ident": null
},
{
"date": "2021-09-15T08:33:00",
"db": "JVNDB",
"id": "JVNDB-2020-015271",
"ident": null
},
{
"date": "2021-07-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-848",
"ident": null
},
{
"date": "2024-11-21T05:20:38.207000",
"db": "NVD",
"id": "CVE-2020-26989",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-848"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Out-of-bounds write vulnerabilities in multiple Siemens products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015271"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-848"
}
],
"trust": 0.6
}
}
CERTFR-2021-AVI-018
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | Les commutateurs de la famille SCALANCE X-200IRT (inclus les variants SIPLUSNET) | ||
| Siemens | N/A | Les commutateurs de la famille SCALANCE X-300 (inclus les variants X408 et SIPLUS NET) versions antérieures à V4.1.0 | ||
| Siemens | N/A | Solid Edge versions antérieures à SE2021MP2 | ||
| Siemens | N/A | T2Go versions antérieures à V13.1.0 | ||
| Siemens | N/A | Teamcenter Visualization versions antérieures à V13.1.0 (cette version reste vulnérable aux vulnérabilités CVE-2020-26989, CVE-2020-26990 et CVE-2020-26991) | ||
| Siemens | N/A | Les commutateurs de la famille SCALANCE X-200 (inclus les variants SIPLUSNET) |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Les commutateurs de la famille SCALANCE X-200IRT (inclus les variants SIPLUSNET)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les commutateurs de la famille SCALANCE X-300 (inclus les variants X408 et SIPLUS NET) versions ant\u00e9rieures \u00e0 V4.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge versions ant\u00e9rieures \u00e0 SE2021MP2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "T2Go versions ant\u00e9rieures \u00e0 V13.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions ant\u00e9rieures \u00e0 V13.1.0 (cette version reste vuln\u00e9rable aux vuln\u00e9rabilit\u00e9s CVE-2020-26989, CVE-2020-26990 et CVE-2020-26991)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Les commutateurs de la famille SCALANCE X-200 (inclus les variants SIPLUSNET)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-25226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25226"
},
{
"name": "CVE-2020-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26996"
},
{
"name": "CVE-2020-26984",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26984"
},
{
"name": "CVE-2020-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26983"
},
{
"name": "CVE-2020-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26989"
},
{
"name": "CVE-2020-26988",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26988"
},
{
"name": "CVE-2020-28381",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28381"
},
{
"name": "CVE-2020-28382",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28382"
},
{
"name": "CVE-2020-28383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28383"
},
{
"name": "CVE-2020-28384",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28384"
},
{
"name": "CVE-2020-26994",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26994"
},
{
"name": "CVE-2020-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26987"
},
{
"name": "CVE-2020-15800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15800"
},
{
"name": "CVE-2020-15799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15799"
},
{
"name": "CVE-2020-26985",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26985"
},
{
"name": "CVE-2020-26991",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26991"
},
{
"name": "CVE-2020-26986",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26986"
},
{
"name": "CVE-2020-28395",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28395"
},
{
"name": "CVE-2020-26982",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26982"
},
{
"name": "CVE-2020-26981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26981"
},
{
"name": "CVE-2020-26995",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26995"
},
{
"name": "CVE-2020-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26992"
},
{
"name": "CVE-2020-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28391"
},
{
"name": "CVE-2020-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26990"
},
{
"name": "CVE-2020-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26993"
},
{
"name": "CVE-2020-26980",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26980"
},
{
"name": "CVE-2020-28386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28386"
}
],
"initial_release_date": "2021-01-12T00:00:00",
"last_revision_date": "2021-01-12T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-018",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-274900 du 12 janvier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-622830 du 12 janvier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-139628 du 12 janvier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-979834 du 12 janvier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"
}
]
}
CERTFR-2021-AVI-094
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | TIA Portal versions 15, 15.1 et 16 | ||
| Siemens | N/A | SENTRON PAC3200T versions antérieures à 3.0.5 | ||
| Siemens | N/A | Teamcenter Visualization versions antérieures à 13.1.0.1 | ||
| Siemens | N/A | SINEMA Server versions antérieures à 14.0 SP2 Update 2 | ||
| Siemens | N/A | Ruggedcom ROX MX5000, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512 et RX5000 versions antérieures à 2.14.0 | ||
| Siemens | N/A | PCS neo v3.0 | ||
| Siemens | N/A | Nucleus NET versions antérieures à 5.2 | ||
| Siemens | N/A | SINEC NMS versions antérieures à 1.0 SP1 Update 1 | ||
| Siemens | N/A | SENTRON 3VA COM100/800 versions antérieures à 4.2 | ||
| Siemens | N/A | SIMATIC PCS 7 | ||
| Siemens | N/A | SENTRON PAC3200 versions antérieures à 2.4.5 | ||
| Siemens | N/A | DIGSI 4 versions antérieures à 4.94 SP1 HF 1 | ||
| Siemens | N/A | SENTRON 3VA DSP800 versions antérieures à 2.0 | ||
| Siemens | N/A | SENTRON PAC2200 versions antérieures à 3.0.5 | ||
| Siemens | N/A | SIMARIS configuration | ||
| Siemens | N/A | SIRIUS 3RW5 module de communication Modbus TCP | ||
| Siemens | N/A | Nucleus ReadyStart pour ARM, MIPS et PPC versions antérieures à 2012.12 | ||
| Siemens | N/A | SCALANCE W780 and W740 versions antérieures à 6.3 | ||
| Siemens | N/A | SIMATIC WinCC versions antérieures à 7.5 SP2 | ||
| Siemens | N/A | SENTRON PAC4200 versions antérieures à 2.0.1 | ||
| Siemens | N/A | JT2Go versions antérieures à 13.1.0.1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "TIA Portal versions 15, 15.1 et 16",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SENTRON PAC3200T versions ant\u00e9rieures \u00e0 3.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions ant\u00e9rieures \u00e0 13.1.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Server versions ant\u00e9rieures \u00e0 14.0 SP2 Update 2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Ruggedcom ROX MX5000, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512 et RX5000 versions ant\u00e9rieures \u00e0 2.14.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "PCS neo v3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Nucleus NET versions ant\u00e9rieures \u00e0 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEC NMS versions ant\u00e9rieures \u00e0 1.0 SP1 Update 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SENTRON 3VA COM100/800 versions ant\u00e9rieures \u00e0 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SENTRON PAC3200 versions ant\u00e9rieures \u00e0 2.4.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "DIGSI 4 versions ant\u00e9rieures \u00e0 4.94 SP1 HF 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SENTRON 3VA DSP800 versions ant\u00e9rieures \u00e0 2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SENTRON PAC2200 versions ant\u00e9rieures \u00e0 3.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMARIS configuration",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIRIUS 3RW5 module de communication Modbus TCP",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Nucleus ReadyStart pour ARM, MIPS et PPC versions ant\u00e9rieures \u00e0 2012.12",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W780 and W740 versions ant\u00e9rieures \u00e0 6.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC versions ant\u00e9rieures \u00e0 7.5 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SENTRON PAC4200 versions ant\u00e9rieures \u00e0 2.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT2Go versions ant\u00e9rieures \u00e0 13.1.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28388"
},
{
"name": "CVE-2021-25174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25174"
},
{
"name": "CVE-2020-27006",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27006"
},
{
"name": "CVE-2020-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13988"
},
{
"name": "CVE-2020-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26989"
},
{
"name": "CVE-2020-25238",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25238"
},
{
"name": "CVE-2018-18508",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18508"
},
{
"name": "CVE-2020-10048",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10048"
},
{
"name": "CVE-2020-27001",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27001"
},
{
"name": "CVE-2020-27004",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27004"
},
{
"name": "CVE-2020-27008",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27008"
},
{
"name": "CVE-2020-25245",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25245"
},
{
"name": "CVE-2019-17007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17007"
},
{
"name": "CVE-2020-28394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28394"
},
{
"name": "CVE-2020-25237",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25237"
},
{
"name": "CVE-2020-26999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26999"
},
{
"name": "CVE-2020-26991",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26991"
},
{
"name": "CVE-2020-26998",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26998"
},
{
"name": "CVE-2020-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27005"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2021-25177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25177"
},
{
"name": "CVE-2021-25175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25175"
},
{
"name": "CVE-2020-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27003"
},
{
"name": "CVE-2020-27000",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27000"
},
{
"name": "CVE-2018-12404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
},
{
"name": "CVE-2021-25666",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25666"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2020-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26990"
},
{
"name": "CVE-2020-28392",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28392"
},
{
"name": "CVE-2021-25176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25176"
},
{
"name": "CVE-2020-27007",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27007"
},
{
"name": "CVE-2021-25178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25178"
},
{
"name": "CVE-2020-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27002"
},
{
"name": "CVE-2021-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25173"
},
{
"name": "CVE-2020-1763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1763"
}
],
"initial_release_date": "2021-02-09T00:00:00",
"last_revision_date": "2021-02-09T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-094",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-02-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-663999 du 9 f\u00e9vrier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-541017 du 9 f\u00e9vrier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-541017.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-944678 du 9 f\u00e9vrier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-944678.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-156833 du 9 f\u00e9vrier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-156833.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-536315 du 9 f\u00e9vrier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-536315.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-362164 du 9 f\u00e9vrier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-362164.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-379803 du 9 f\u00e9vrier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-428051 du 9 f\u00e9vrier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-428051.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-794542 du 9 f\u00e9vrier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-794542.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-686152 du 9 f\u00e9vrier 2021",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-686152.pdf"
}
]
}
fkie_cve-2020-26989
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf | Vendor Advisory | |
| productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf | Patch, Vendor Advisory | |
| productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf | Vendor Advisory | |
| productcert@siemens.com | https://www.zerodayinitiative.com/advisories/ZDI-21-050/ | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-050/ | Third Party Advisory, VDB Entry |
| Vendor | Product | Version | |
|---|---|---|---|
| siemens | jt2go | * | |
| siemens | solid_edge | * | |
| siemens | solid_edge | se2021 | |
| siemens | solid_edge | se2021 | |
| siemens | teamcenter_visualization | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4FB80DF8-5E85-4072-8999-02EDA895A112",
"versionEndExcluding": "13.1.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
"matchCriteriaId": "576A303A-66CA-4694-AA54-9EB0137C24F1",
"versionEndExcluding": "se2021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
"matchCriteriaId": "39D237BD-EE55-4B40-ABC3-194C4BF7C6CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
"matchCriteriaId": "49F5649A-349C-42C6-AFFF-CEE1ABC14E67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB3193F-54C0-4678-A22D-A98D2134F9E7",
"versionEndExcluding": "13.1.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in JT2Go (All versions \u003c V13.1.0.1), Solid Edge SE2020 (All Versions \u003c SE2020MP12), Solid Edge SE2021 (All Versions \u003c SE2021MP2), Teamcenter Visualization (All versions \u003c V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892)"
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en JT2Go (Todas las versiones anteriores a V13.1.0.1), Solid Edge SE2020 (Todas las versiones anteriores a SE2020MP12), Solid Edge SE2021 (Todas las versiones anteriores a SE2021MP2), Teamcenter Visualization (Todas las versiones anteriores a V13.1.0.1). Las aplicaciones afectadas carecen de una comprobaci\u00f3n apropiada de los datos proporcionados por el usuario al analizar archivos PAR. Esto podr\u00eda resultar en un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria. Un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. (ZDI-CAN-11892)"
}
],
"id": "CVE-2020-26989",
"lastModified": "2024-11-21T05:20:38.207",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-12T21:15:17.183",
"references": [
{
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"
},
{
"source": "productcert@siemens.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-050/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-050/"
}
],
"sourceIdentifier": "productcert@siemens.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "productcert@siemens.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.