CVE-2023-49125: CWE-125: Out-of-bounds Read in Siemens Parasolid V35.0
A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.263), Parasolid V35.1 (All versions < V35.1.252), Parasolid V36.0 (All versions < V36.0.198), Solid Edge SE2023 (All versions < V223.0 Update 11), Solid Edge SE2024 (All versions < V224.0 Update 3). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted files containing XT format. This could allow an attacker to execute code in the context of the current process.
AI Analysis
Technical Summary
CVE-2023-49125 is a high-severity vulnerability identified in Siemens Parasolid versions prior to V35.0.263, V35.1.252, V36.0.198, and in Solid Edge SE2023 versions before V223.0 Update 11 and SE2024 versions before V224.0 Update 3. The vulnerability is classified as CWE-125, an out-of-bounds read, which occurs when the affected software parses specially crafted XT format files. Specifically, the vulnerability arises from reading beyond the allocated memory boundary of a structure during file parsing. This memory corruption can lead to the disclosure of sensitive information or potentially allow an attacker to execute arbitrary code within the context of the current process. The CVSS v3.1 base score is 7.8, indicating high severity, with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no official patches or updates are linked in the provided data, although Siemens has reserved the CVE and published the advisory. The vulnerability affects core Siemens CAD components used for 3D modeling and design, which are critical in engineering and manufacturing workflows.
Potential Impact
For European organizations, especially those in manufacturing, automotive, aerospace, and industrial design sectors, this vulnerability poses a significant risk. Siemens Parasolid and Solid Edge are widely used CAD kernels and design software in Europe, integral to product development and engineering processes. Exploitation could lead to unauthorized code execution, potentially allowing attackers to manipulate design files, steal intellectual property, or disrupt production workflows. Given the local attack vector and requirement for user interaction, the threat is more likely to arise from targeted attacks such as malicious insiders or spear-phishing campaigns delivering crafted XT files. The high impact on confidentiality, integrity, and availability means that successful exploitation could compromise sensitive design data, cause downtime, and damage trust in critical engineering systems. Additionally, the lack of known exploits currently suggests a window of opportunity for defenders to patch and mitigate before widespread exploitation occurs.
Mitigation Recommendations
European organizations should prioritize the following specific actions: 1) Identify and inventory all Siemens Parasolid and Solid Edge installations, verifying versions against the affected ranges. 2) Apply the latest Siemens updates and patches as soon as they become available, monitoring Siemens advisories closely. 3) Implement strict file handling policies to restrict the opening of untrusted or unsolicited XT format files, including disabling automatic loading of such files where possible. 4) Enhance endpoint security controls to detect and block suspicious local file parsing activities, including monitoring for anomalous behavior in CAD applications. 5) Conduct user awareness training focused on the risks of opening unexpected CAD files and the importance of verifying file sources. 6) Employ application whitelisting and sandboxing techniques for CAD software to limit the impact of potential exploitation. 7) Regularly back up critical design data and maintain incident response plans tailored to engineering environments. These targeted measures go beyond generic advice by focusing on the specific attack vector (local file parsing) and the operational context of Siemens CAD software.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Sweden, Belgium, Poland, Czech Republic
CVE-2023-49125: CWE-125: Out-of-bounds Read in Siemens Parasolid V35.0
Description
A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.263), Parasolid V35.1 (All versions < V35.1.252), Parasolid V36.0 (All versions < V36.0.198), Solid Edge SE2023 (All versions < V223.0 Update 11), Solid Edge SE2024 (All versions < V224.0 Update 3). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted files containing XT format. This could allow an attacker to execute code in the context of the current process.
AI-Powered Analysis
Technical Analysis
CVE-2023-49125 is a high-severity vulnerability identified in Siemens Parasolid versions prior to V35.0.263, V35.1.252, V36.0.198, and in Solid Edge SE2023 versions before V223.0 Update 11 and SE2024 versions before V224.0 Update 3. The vulnerability is classified as CWE-125, an out-of-bounds read, which occurs when the affected software parses specially crafted XT format files. Specifically, the vulnerability arises from reading beyond the allocated memory boundary of a structure during file parsing. This memory corruption can lead to the disclosure of sensitive information or potentially allow an attacker to execute arbitrary code within the context of the current process. The CVSS v3.1 base score is 7.8, indicating high severity, with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no official patches or updates are linked in the provided data, although Siemens has reserved the CVE and published the advisory. The vulnerability affects core Siemens CAD components used for 3D modeling and design, which are critical in engineering and manufacturing workflows.
Potential Impact
For European organizations, especially those in manufacturing, automotive, aerospace, and industrial design sectors, this vulnerability poses a significant risk. Siemens Parasolid and Solid Edge are widely used CAD kernels and design software in Europe, integral to product development and engineering processes. Exploitation could lead to unauthorized code execution, potentially allowing attackers to manipulate design files, steal intellectual property, or disrupt production workflows. Given the local attack vector and requirement for user interaction, the threat is more likely to arise from targeted attacks such as malicious insiders or spear-phishing campaigns delivering crafted XT files. The high impact on confidentiality, integrity, and availability means that successful exploitation could compromise sensitive design data, cause downtime, and damage trust in critical engineering systems. Additionally, the lack of known exploits currently suggests a window of opportunity for defenders to patch and mitigate before widespread exploitation occurs.
Mitigation Recommendations
European organizations should prioritize the following specific actions: 1) Identify and inventory all Siemens Parasolid and Solid Edge installations, verifying versions against the affected ranges. 2) Apply the latest Siemens updates and patches as soon as they become available, monitoring Siemens advisories closely. 3) Implement strict file handling policies to restrict the opening of untrusted or unsolicited XT format files, including disabling automatic loading of such files where possible. 4) Enhance endpoint security controls to detect and block suspicious local file parsing activities, including monitoring for anomalous behavior in CAD applications. 5) Conduct user awareness training focused on the risks of opening unexpected CAD files and the importance of verifying file sources. 6) Employ application whitelisting and sandboxing techniques for CAD software to limit the impact of potential exploitation. 7) Regularly back up critical design data and maintain incident response plans tailored to engineering environments. These targeted measures go beyond generic advice by focusing on the specific attack vector (local file parsing) and the operational context of Siemens CAD software.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2023-11-22T14:43:13.524Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd8a33
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/5/2025, 8:11:35 AM
Last updated: 8/14/2025, 2:45:32 AM
Views: 11
Related Threats
CVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57702: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57701: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.