Skip to main content

CVE-2023-49125: CWE-125: Out-of-bounds Read in Siemens Parasolid V35.0

High
VulnerabilityCVE-2023-49125cvecve-2023-49125cwe-125
Published: Tue Feb 13 2024 (02/13/2024, 08:59:57 UTC)
Source: CVE
Vendor/Project: Siemens
Product: Parasolid V35.0

Description

A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.263), Parasolid V35.1 (All versions < V35.1.252), Parasolid V36.0 (All versions < V36.0.198), Solid Edge SE2023 (All versions < V223.0 Update 11), Solid Edge SE2024 (All versions < V224.0 Update 3). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted files containing XT format. This could allow an attacker to execute code in the context of the current process.

AI-Powered Analysis

AILast updated: 07/05/2025, 08:11:35 UTC

Technical Analysis

CVE-2023-49125 is a high-severity vulnerability identified in Siemens Parasolid versions prior to V35.0.263, V35.1.252, V36.0.198, and in Solid Edge SE2023 versions before V223.0 Update 11 and SE2024 versions before V224.0 Update 3. The vulnerability is classified as CWE-125, an out-of-bounds read, which occurs when the affected software parses specially crafted XT format files. Specifically, the vulnerability arises from reading beyond the allocated memory boundary of a structure during file parsing. This memory corruption can lead to the disclosure of sensitive information or potentially allow an attacker to execute arbitrary code within the context of the current process. The CVSS v3.1 base score is 7.8, indicating high severity, with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no official patches or updates are linked in the provided data, although Siemens has reserved the CVE and published the advisory. The vulnerability affects core Siemens CAD components used for 3D modeling and design, which are critical in engineering and manufacturing workflows.

Potential Impact

For European organizations, especially those in manufacturing, automotive, aerospace, and industrial design sectors, this vulnerability poses a significant risk. Siemens Parasolid and Solid Edge are widely used CAD kernels and design software in Europe, integral to product development and engineering processes. Exploitation could lead to unauthorized code execution, potentially allowing attackers to manipulate design files, steal intellectual property, or disrupt production workflows. Given the local attack vector and requirement for user interaction, the threat is more likely to arise from targeted attacks such as malicious insiders or spear-phishing campaigns delivering crafted XT files. The high impact on confidentiality, integrity, and availability means that successful exploitation could compromise sensitive design data, cause downtime, and damage trust in critical engineering systems. Additionally, the lack of known exploits currently suggests a window of opportunity for defenders to patch and mitigate before widespread exploitation occurs.

Mitigation Recommendations

European organizations should prioritize the following specific actions: 1) Identify and inventory all Siemens Parasolid and Solid Edge installations, verifying versions against the affected ranges. 2) Apply the latest Siemens updates and patches as soon as they become available, monitoring Siemens advisories closely. 3) Implement strict file handling policies to restrict the opening of untrusted or unsolicited XT format files, including disabling automatic loading of such files where possible. 4) Enhance endpoint security controls to detect and block suspicious local file parsing activities, including monitoring for anomalous behavior in CAD applications. 5) Conduct user awareness training focused on the risks of opening unexpected CAD files and the importance of verifying file sources. 6) Employ application whitelisting and sandboxing techniques for CAD software to limit the impact of potential exploitation. 7) Regularly back up critical design data and maintain incident response plans tailored to engineering environments. These targeted measures go beyond generic advice by focusing on the specific attack vector (local file parsing) and the operational context of Siemens CAD software.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2023-11-22T14:43:13.524Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8a33

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 8:11:35 AM

Last updated: 8/14/2025, 2:45:32 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats