Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40936: CWE-125: Out-of-bounds Read in Siemens PS/IGES Parasolid Translator Component

0
High
VulnerabilityCVE-2025-40936cvecve-2025-40936cwe-125
Published: Mon Nov 17 2025 (11/17/2025, 11:39:23 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: PS/IGES Parasolid Translator Component

Description

A vulnerability has been identified in PS/IGES Parasolid Translator Component (All versions < V29.0.258). The affected applications contains an out of bounds read vulnerability while parsing specially crafted IGS files. This could allow an attacker to crash the application or execute code in the context of the current process. (ZDI-CAN-26755)

AI-Powered Analysis

AILast updated: 11/17/2025, 11:58:26 UTC

Technical Analysis

CVE-2025-40936 identifies a critical out-of-bounds read vulnerability in the Siemens PS/IGES Parasolid Translator Component, which is used to parse IGS files—a common CAD file format. The vulnerability arises from improper bounds checking during the parsing process, allowing specially crafted IGS files to trigger reads outside the allocated memory buffer. This can lead to application crashes (denial of service) or, more severely, arbitrary code execution within the context of the running process. The vulnerability affects all versions prior to V29.0.258, with no patches currently publicly available. Exploitation requires local access and user interaction, as the attacker must supply a malicious IGS file to the vulnerable application. The CVSS 3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. The flaw is tracked under CWE-125 (out-of-bounds read) and was reserved in April 2025, with publication in November 2025. Although no known exploits are reported in the wild, the potential for code execution makes this a significant threat, especially for organizations relying on Siemens' CAD tools in engineering and manufacturing workflows.

Potential Impact

For European organizations, especially those in manufacturing, automotive, aerospace, and industrial engineering sectors that rely heavily on Siemens CAD and CAE software incorporating the PS/IGES Parasolid Translator Component, this vulnerability poses a substantial risk. Successful exploitation can lead to unauthorized code execution, potentially allowing attackers to manipulate design files, steal intellectual property, or disrupt engineering operations. The ability to crash applications can cause denial of service, impacting productivity and project timelines. Given the critical nature of design data in these industries, confidentiality breaches could result in significant financial and reputational damage. Furthermore, compromised systems could serve as footholds for further lateral movement within corporate networks. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, particularly in environments where users handle untrusted CAD files or collaborate with external partners. The absence of known exploits currently provides a window for proactive mitigation.

Mitigation Recommendations

1. Immediately plan to upgrade the PS/IGES Parasolid Translator Component to version V29.0.258 or later once Siemens releases the patch. 2. Until patched, implement strict controls on the handling of IGS files, including blocking or quarantining files from untrusted sources. 3. Employ application whitelisting and sandboxing techniques to isolate the vulnerable component and limit the impact of potential exploitation. 4. Educate users about the risks of opening untrusted CAD files and enforce policies to verify file origins before use. 5. Monitor system and application logs for unusual crashes or behaviors indicative of exploitation attempts. 6. Restrict local access to systems running the vulnerable software to trusted personnel only. 7. Coordinate with Siemens support and subscribe to their security advisories for timely updates. 8. Consider network segmentation to limit the spread of compromise from affected endpoints. 9. Conduct vulnerability scanning and penetration testing focused on CAD environments to identify exposure. 10. Maintain robust backup and recovery procedures for critical design data to mitigate impact from denial-of-service conditions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2025-04-16T09:06:15.878Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691b0bd1502dbbeec6e1cf57

Added to database: 11/17/2025, 11:49:37 AM

Last enriched: 11/17/2025, 11:58:26 AM

Last updated: 11/17/2025, 1:14:55 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats