Title: Siemens JT2Go PAR File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability ID: - ZDI-21-049 - ZDI-CAN-11891 CVE ID: CVE-2020-26988 CVSS Score: 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) Affected Vendors: Siemens Affected Products: JT2Go Vulnerability Details: - This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability. - The flaw is in the parsing of PAR files due to lack of proper validation of user-supplied data. - It can be exploited by an attacker to execute code in the context of the current process. Additional Details: Siemens has issued an update. More details: https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/ Disclosure Timeline: - Reported to vendor: 2020-09-25 - Public release: 2021-01-14 Credit: rgod