- **Title**: Siemens JT2Go PAR File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability - **ID**: - ZDI-21-049 - ZDI-CAN-11891 - **CVE ID**: CVE-2020-26988 - **CVSS Score**: 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) - **Affected Vendors**: Siemens - **Affected Products**: JT2Go - **Vulnerability Details**: - This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability. - The flaw is in the parsing of PAR files due to lack of proper validation of user-supplied data. - It can be exploited by an attacker to execute code in the context of the current process. - **Additional Details**: Siemens has issued an update. More details: https://us-cert.cisa.gov/ics/advisories/icsa-21-012-03/ - **Disclosure Timeline**: - Reported to vendor: 2020-09-25 - Public release: 2021-01-14 - **Credit**: rgod