Skip to main content

CVE-2023-49128: CWE-787: Out-of-bounds Write in Siemens Solid Edge SE2023

High
VulnerabilityCVE-2023-49128cvecve-2023-49128cwe-787
Published: Tue Jan 09 2024 (01/09/2024, 10:00:00 UTC)
Source: CVE
Vendor/Project: Siemens
Product: Solid Edge SE2023

Description

A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to execute code in the context of the current process.

AI-Powered Analysis

AILast updated: 06/25/2025, 16:40:33 UTC

Technical Analysis

CVE-2023-49128 is a high-severity vulnerability affecting Siemens Solid Edge SE2023 versions prior to V223.0 Update 10. The vulnerability is classified as CWE-787, an out-of-bounds write, which occurs when the application parses a specially crafted PAR file. Specifically, the flaw allows writing past the end of an allocated buffer, leading to memory corruption. This memory corruption can be exploited by an attacker to execute arbitrary code within the context of the current process. The vulnerability requires local access (Attack Vector: Local) and no privileges (PR: None), but does require user interaction (UI: Required), meaning the victim must open or otherwise process a malicious PAR file. The scope is unchanged (S: Unchanged), so the impact is limited to the vulnerable component. The CVSS 3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with partial exploitability due to the need for user interaction and local access. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and patched in V223.0 Update 10. Siemens Solid Edge is a widely used CAD software in engineering and manufacturing sectors, often handling sensitive design files. The vulnerability could allow attackers to execute code, potentially leading to theft of intellectual property, disruption of engineering workflows, or further network compromise if leveraged as a foothold.

Potential Impact

For European organizations, especially those in manufacturing, automotive, aerospace, and industrial design sectors, this vulnerability poses a significant risk. Siemens Solid Edge is commonly used across Europe in these industries, which are critical to the European economy and technological infrastructure. Exploitation could lead to unauthorized access to proprietary design data, intellectual property theft, and disruption of production processes. Given the high confidentiality and integrity impact, attackers could manipulate design files or implant malicious code, potentially causing defective product designs or sabotage. The requirement for local access and user interaction somewhat limits remote exploitation, but targeted spear-phishing or insider threat scenarios remain plausible. The availability impact also raises concerns about operational downtime if the software crashes or is manipulated maliciously. Overall, the vulnerability could have cascading effects on supply chains and industrial competitiveness within Europe.

Mitigation Recommendations

1. Immediate application of the Siemens Solid Edge SE2023 patch to version V223.0 Update 10 or later is critical. Since no patch links are provided in the data, organizations should obtain updates directly from Siemens official channels. 2. Implement strict file handling policies to restrict the opening of PAR files from untrusted or unknown sources. 3. Employ endpoint protection solutions capable of detecting anomalous behavior related to memory corruption or code execution attempts within Solid Edge processes. 4. Conduct user awareness training focused on the risks of opening unsolicited or suspicious CAD files, emphasizing the need for caution with PAR files. 5. Use application whitelisting and sandboxing techniques to limit the execution context of Solid Edge, reducing the impact of potential exploitation. 6. Monitor logs and network traffic for unusual activity originating from Solid Edge workstations, especially after file imports. 7. For organizations with high-value intellectual property, consider network segmentation to isolate engineering workstations and limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2023-11-22T14:50:33.103Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed126

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 4:40:33 PM

Last updated: 7/31/2025, 12:29:24 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats