RULE(RULE ID:332469)

Rule General Information
Release Date: 2021-02-02
Rule Name: Siemens JT2Go PLMXML File Parsing External Entity Injection Vulnerability -1 (CVE-2020-26981)
Severity:
CVE ID:
Rule Protection Details
Description: A vulnerability has been identified in JT2Go (All Versions < V13.1.0), Teamcenter Visualization (All Versions < V13.1.0). When opening a specially crafted xml file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd.
Impact: An attacker can abtain sensitive information of the target victim, and do malicious actions to gain profits using the information.
Affected OS: Windows, Linux
Reference: https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf
ZeroDayInitiative:ZDI-21-048
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf