Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40809: CWE-787: Out-of-bounds Write in Siemens Solid Edge SE2024

0
High
VulnerabilityCVE-2025-40809cvecve-2025-40809cwe-787
Published: Tue Oct 14 2025 (10/14/2025, 09:15:27 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: Solid Edge SE2024

Description

A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 14), Solid Edge SE2025 (All versions < V225.0 Update 6). The affected applications contains an out of bounds write vulnerability while parsing specially crafted PRT files. This could allow an attacker to crash the application or execute code in the context of the current process.

AI-Powered Analysis

AILast updated: 10/14/2025, 09:36:41 UTC

Technical Analysis

CVE-2025-40809 is an out-of-bounds write vulnerability classified under CWE-787 affecting Siemens Solid Edge SE2024 and SE2025 CAD software versions prior to V224.0 Update 14 and V225.0 Update 6 respectively. The flaw arises when the software parses specially crafted PRT files, which are proprietary part files used in Solid Edge. An attacker who can convince a user to open or process a malicious PRT file can trigger an out-of-bounds write, leading to memory corruption. This memory corruption can cause the application to crash (denial of service) or, more critically, enable arbitrary code execution within the context of the current user process. The CVSS 3.1 base score is 7.8, reflecting high severity due to the potential for full compromise of the affected application. The attack vector is local (AV:L), requiring the attacker to have local access or deliver the malicious file to the user. No privileges are required (PR:N), but user interaction is necessary (UI:R) to open the malicious file. The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H), making it a significant risk. Siemens has not yet published patches at the time of this report, and no known exploits have been observed in the wild. The vulnerability was reserved in April 2025 and published in October 2025. This vulnerability is particularly concerning for organizations relying on Solid Edge for critical design and manufacturing workflows, as exploitation could lead to intellectual property theft, sabotage, or disruption of engineering processes.

Potential Impact

For European organizations, especially those in manufacturing, automotive, aerospace, and engineering sectors that utilize Siemens Solid Edge software, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized code execution, allowing attackers to steal sensitive design data, manipulate CAD models, or disrupt production workflows. This could result in intellectual property loss, financial damage, and reputational harm. Additionally, denial of service through application crashes could interrupt critical design activities, delaying projects and increasing operational costs. Since Siemens Solid Edge is widely used in Europe, particularly in countries with strong industrial bases, the impact could be widespread. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, as attackers may use phishing or social engineering to deliver malicious files. The high confidentiality, integrity, and availability impact ratings underscore the potential for severe consequences if exploited.

Mitigation Recommendations

1. Apply Siemens Solid Edge updates promptly once Siemens releases patches for the affected versions (V224.0 Update 14 and V225.0 Update 6 or later). 2. Until patches are available, restrict the opening of PRT files from untrusted or unknown sources. Implement strict file validation and scanning policies for CAD files entering the environment. 3. Educate users about the risks of opening unsolicited or suspicious PRT files, emphasizing caution with files received via email or external media. 4. Employ endpoint protection solutions capable of detecting anomalous behavior related to Solid Edge processes, including memory corruption attempts. 5. Use application whitelisting and sandboxing techniques to limit the impact of potential exploitation. 6. Monitor logs and network activity for unusual behavior originating from Solid Edge instances, such as unexpected process launches or network connections. 7. Implement strict access controls to limit local access to systems running Solid Edge to trusted personnel only. 8. Consider network segmentation to isolate engineering workstations from broader corporate networks to reduce lateral movement risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2025-04-16T08:50:26.974Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee16327eab8b438c025d96

Added to database: 10/14/2025, 9:21:54 AM

Last enriched: 10/14/2025, 9:36:41 AM

Last updated: 10/16/2025, 12:19:50 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats