Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23720: CWE-125: Out-of-bounds Read in Siemens Simcenter Femap

0
High
VulnerabilityCVE-2026-23720cvecve-2026-23720cwe-125
Published: Tue Feb 10 2026 (02/10/2026, 09:58:53 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: Simcenter Femap

Description

A vulnerability has been identified in Simcenter Femap (All versions < V2512), Simcenter Nastran (All versions < V2512). The affected applications contains an out of bounds read vulnerability while parsing specially crafted NDB files. This could allow an attacker to execute code in the context of the current process.

AI-Powered Analysis

AILast updated: 02/10/2026, 10:30:53 UTC

Technical Analysis

CVE-2026-23720 is an out-of-bounds read vulnerability classified under CWE-125 affecting Siemens Simcenter Femap and Simcenter Nastran software versions earlier than V2512. The flaw arises when the software parses specially crafted NDB files, which are likely used for simulation data input. This improper bounds checking allows an attacker to read memory outside the intended buffer, potentially leading to arbitrary code execution within the context of the running application. The vulnerability requires local access and user interaction, as the user must open or process a malicious NDB file. No elevated privileges are necessary, increasing the risk if a user is tricked into opening a malicious file. The CVSS 3.1 score of 7.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity but limited to local vector. Siemens has reserved the CVE and published the vulnerability details but has not yet released a patch, indicating the need for vigilance. The affected software is widely used in engineering and manufacturing sectors for finite element analysis and simulation, making this vulnerability significant for organizations relying on these tools for critical design and testing workflows. Exploitation could allow attackers to execute arbitrary code, potentially leading to data theft, manipulation of simulation results, or disruption of engineering processes.

Potential Impact

For European organizations, the impact of CVE-2026-23720 is substantial due to the reliance on Siemens Simcenter Femap and Nastran in automotive, aerospace, industrial machinery, and energy sectors. Successful exploitation could compromise sensitive intellectual property embedded in simulation data, alter engineering outcomes, or disrupt production timelines. This could lead to financial losses, reputational damage, and safety risks if flawed designs are propagated. The vulnerability's ability to execute code within the application context means attackers could pivot to broader network compromise or sabotage. Given the critical role of these tools in product development, the availability and integrity of simulation software are paramount. Additionally, the requirement for user interaction means phishing or social engineering could be used to deliver malicious files, increasing the attack surface. The absence of known exploits in the wild currently reduces immediate risk but does not preclude targeted attacks against high-value European industrial targets.

Mitigation Recommendations

1. Immediately plan to upgrade Siemens Simcenter Femap and Nastran to version V2512 or later once the patch is released by Siemens. 2. Until patches are available, restrict the import and opening of NDB files to trusted sources only, implementing strict file validation and scanning. 3. Educate users on the risks of opening unsolicited or suspicious simulation files, emphasizing phishing awareness and safe handling practices. 4. Employ application whitelisting and sandboxing techniques to limit the impact of potential code execution within the simulation software. 5. Monitor system and application logs for unusual behavior or crashes related to NDB file processing. 6. Coordinate with Siemens support for any available interim mitigations or workarounds. 7. Implement network segmentation to isolate engineering workstations running these tools from broader enterprise networks to contain potential compromises. 8. Regularly back up critical simulation data and configurations to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2026-01-15T14:48:10.775Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b05e84b57a58fa1fb4507

Added to database: 2/10/2026, 10:18:16 AM

Last enriched: 2/10/2026, 10:30:53 AM

Last updated: 2/21/2026, 12:23:18 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats