Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-7066", "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "state": "PUBLISHED", "assignerShortName": "icscert", "dateReserved": "2023-12-21T19:40:53.933Z", "datePublished": "2024-08-12T21:46:38.910Z", "dateUpdated": "2024-08-14T14:02:45.201Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "JT2Go", "vendor": "Siemens", "versions": [{"lessThan": "V14.3.0.8", "status": "affected", "version": "0", "versionType": "custom"}]}, {"defaultStatus": "unaffected", "product": "Teamcenter Visualization", "vendor": "Siemens", "versions": [{"lessThan": "V14.1.0.14", "status": "affected", "version": "0", "versionType": "custom"}, {"lessThan": "V14.2.0.10", "status": "affected", "version": "0", "versionType": "custom"}, {"lessThan": "V14.3.0.8", "status": "affected", "version": "0", "versionType": "custom"}, {"lessThan": "V2312.0002", "status": "affected", "version": "0", "versionType": "custom"}]}], "credits": [{"lang": "en", "type": "finder", "value": "MoyunSec reported this vulnerability to Siemens."}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "The affected applications contain an out of bounds read past the end of \nan allocated structure while parsing specially crafted PDF files. This \ncould allow an attacker to execute code in the context of the current \nprocess."}], "value": "The affected applications contain an out of bounds read past the end of \nan allocated structure while parsing specially crafted PDF files. This \ncould allow an attacker to execute code in the context of the current \nprocess."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}, {"cvssV4_0": {"Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 7.3, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-125", "description": "CWE-125", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert", "dateUpdated": "2024-08-12T21:46:38.910Z"}, "references": [{"url": "https://cert-portal.siemens.com/productcert/html/ssa-722010.html"}, {"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-03"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>\nSiemens has released new versions for the affected products and recommends to update to the latest versions.\n\n:</p><ul><li>Teamcenter Visualization V14.1: Update to <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.sw.siemens.com/\">V14.1.0.14 or later version</a></li><li>Teamcenter Visualization V14.2: Update to <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.sw.siemens.com/\">V14.2.0.10 or later version</a></li><li>JT2Go: Update to <a target=\"_blank\" rel=\"nofollow\" href=\"https://plm.sw.siemens.com/en-US/plmcomponents/jt/jt2go/\">V14.3.0.8 or later version</a></li><li>Teamcenter Visualization V14.3: Update to <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.sw.siemens.com/\">V14.3.0.8 or later version</a></li><li>Teamcenter Visualization V2312: Update to <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.sw.siemens.com/\">V2312.0002 or later version</a></li></ul>\nFor more information see the associated Siemens security advisory SSA-722010\n\n\n\n<br>"}], "value": "Siemens has released new versions for the affected products and recommends to update to the latest versions.\n\n:\n\n * Teamcenter Visualization V14.1: Update to V14.1.0.14 or later version https://support.sw.siemens.com/ \n * Teamcenter Visualization V14.2: Update to V14.2.0.10 or later version https://support.sw.siemens.com/ \n * JT2Go: Update to V14.3.0.8 or later version https://plm.sw.siemens.com/en-US/plmcomponents/jt/jt2go/ \n * Teamcenter Visualization V14.3: Update to V14.3.0.8 or later version https://support.sw.siemens.com/ \n * Teamcenter Visualization V2312: Update to V2312.0002 or later version https://support.sw.siemens.com/ \n\n\n\nFor more information see the associated Siemens security advisory SSA-722010"}], "source": {"advisory": "ICSA-24-193-03", "discovery": "EXTERNAL"}, "title": "Siemens Teamcenter Visualization and JT2Go Out-of-bounds Read", "workarounds": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>To reduce risk, Siemens \nrecommends users not open untrusted PDF files in affected applications.<br></p><ul>\n</ul>\n<p>As a general security measure, Siemens recommends protecting network \naccess to devices with appropriate mechanisms. To operate the devices in\n a protected IT environment, Siemens recommends configuring the \nenvironment according to <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.siemens.com/cert/operational-guidelines-industrial-security\">Siemens' operational guidelines for industrial security</a> and following recommendations in the product manuals.</p>\n<p>Additional information on industrial security by Siemens can be found on the <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.siemens.com/industrialsecurity\">Siemens industrial security webpage</a></p>For more information see the associated Siemens security advisory SSA-722010\n\n<br>"}], "value": "To reduce risk, Siemens \nrecommends users not open untrusted PDF files in affected applications.\n\n\n\n\n\n\nAs a general security measure, Siemens recommends protecting network \naccess to devices with appropriate mechanisms. To operate the devices in\n a protected IT environment, Siemens recommends configuring the \nenvironment according to Siemens' operational guidelines for industrial security https://www.siemens.com/cert/operational-guidelines-industrial-security and following recommendations in the product manuals.\n\n\nAdditional information on industrial security by Siemens can be found on the Siemens industrial security webpage https://www.siemens.com/industrialsecurity \n\nFor more information see the associated Siemens security advisory SSA-722010"}], "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"affected": [{"vendor": "siemens", "product": "jt2go", "cpes": ["cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "14.3.0.8", "versionType": "custom"}]}, {"vendor": "siemens", "product": "teamcenter_visualization", "cpes": ["cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "14.1.0.14", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThan": "14.2.0.10", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThan": "14.3.0.8", "versionType": "custom"}, {"version": "0", "status": "affected", "lessThan": "2312.0002", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-08-14T13:56:38.749766Z", "id": "CVE-2023-7066", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-08-14T14:02:45.201Z"}}]}}