Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40936: CWE-125: Out-of-bounds Read in Siemens PS/IGES Parasolid Translator Component

0
High
VulnerabilityCVE-2025-40936cvecve-2025-40936cwe-125
Published: Mon Nov 17 2025 (11/17/2025, 11:39:23 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: PS/IGES Parasolid Translator Component

Description

A vulnerability has been identified in PS/IGES Parasolid Translator Component (All versions < V29.0.258), Solid Edge (All versions < V226.00 Update 03). The affected applications contains an out of bounds read vulnerability while parsing specially crafted IGS files. This could allow an attacker to crash the application or execute code in the context of the current process. (ZDI-CAN-26755)

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 10:20:42 UTC

Technical Analysis

CVE-2025-40936 is an out-of-bounds read vulnerability classified under CWE-125, found in the Siemens PS/IGES Parasolid Translator Component, which is integrated into Siemens Solid Edge CAD software. This vulnerability exists in all versions prior to V29.0.258 of the component and Solid Edge versions before V226.00 Update 03. The issue occurs when the software parses specially crafted IGS (Initial Graphics Exchange Specification) files, a common CAD file format used for exchanging 3D models. The out-of-bounds read can lead to memory corruption, which attackers can leverage to cause application crashes (denial of service) or execute arbitrary code with the privileges of the user running the application. The CVSS 3.1 score of 7.8 reflects a high severity, with attack vector being local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No public exploits are currently known, but the vulnerability's nature makes it a critical concern for environments relying on Siemens CAD tools. The vulnerability was reserved in April 2025 and published in November 2025, indicating recent discovery and disclosure. Siemens has not yet provided patch links, suggesting patches may be forthcoming or in development.

Potential Impact

For European organizations, especially those in manufacturing, automotive, aerospace, and engineering sectors that heavily rely on Siemens Solid Edge and Parasolid components for CAD and product design, this vulnerability poses significant risks. Successful exploitation could lead to unauthorized code execution, potentially allowing attackers to manipulate design files, steal intellectual property, or disrupt engineering workflows. The ability to crash applications can cause operational downtime, impacting productivity and project timelines. Given the high confidentiality and integrity impact, sensitive design data could be exposed or altered, undermining competitive advantage and compliance with data protection regulations such as GDPR. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, as phishing or social engineering could be used to trick users into opening malicious IGS files. The lack of known exploits currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Apply Siemens-provided patches immediately once available for PS/IGES Parasolid Translator Component and Solid Edge software to remediate the vulnerability. 2. Until patches are released, restrict the import and opening of IGS files from untrusted or unknown sources to reduce exposure. 3. Implement application whitelisting and sandboxing to limit the impact of potential code execution within the CAD environment. 4. Educate users on the risks of opening unsolicited or suspicious CAD files, emphasizing caution with IGS files received via email or external media. 5. Monitor systems for unusual application crashes or behaviors that could indicate exploitation attempts. 6. Employ endpoint detection and response (EDR) tools to detect anomalous process activities related to Solid Edge. 7. Coordinate with Siemens support and subscribe to their security advisories for timely updates. 8. Review and enforce least privilege principles for users running CAD software to minimize potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2025-04-16T09:06:15.878Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691b0bd1502dbbeec6e1cf57

Added to database: 11/17/2025, 11:49:37 AM

Last enriched: 2/10/2026, 10:20:42 AM

Last updated: 3/21/2026, 4:58:29 PM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses