Siemens Solid Edge File Parsing
Plan Patch7.8ICS-CERT ICSA-21-068-09Mar 9, 2021
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Siemens Solid Edge contains multiple file parsing vulnerabilities (CWE-787, CWE-611, CWE-125) in handling PAR, DFT, and XML file formats. When an affected version reads a malicious file, the application may crash, extract sensitive data, or execute arbitrary code. The vulnerability is triggered when a user opens a crafted file in the application. These are not remotely exploitable; they require local file access and user interaction.
What this means
What could happen
An attacker could trick an engineer or designer into opening a malicious Solid Edge file (PAR, DFT, or XML format), causing the application to crash or execute arbitrary code with the user's privileges. This could compromise sensitive design data or the engineering workstation itself.
Who's at risk
This affects organizations that use Siemens Solid Edge for design and engineering work, including manufacturing facilities, engineering firms, and utilities that design or modify industrial equipment. The risk is highest for engineering workstations where design files are shared or received from external partners.
How it could be exploited
An attacker crafts a malicious Solid Edge file (PAR, DFT, or XML format) and delivers it via email or social engineering. When a user opens the file in Solid Edge, the application parses the malicious content and either crashes, extracts data, or executes arbitrary code on the workstation.
Prerequisites
- User must open a malicious file in Solid Edge (local file access via email, USB, or network share)
- User interaction required (must manually open the file)
- No authentication needed beyond user access to the workstation
Local file attack requires user interactionNo authentication requiredLow complexity attackHigh-impact payload (code execution possible)Affects engineering workstations which may have access to design data or system schematics
Exploitability
Low exploit probability (EPSS 0.5%)
Affected products (3)
3 with fix
ProductAffected VersionsFix Status
Solid Edge SE2021<SE2021MP3SE2021MP3 or later
Solid Edge SE2020<SE2020MP13SE2020MP13 or later
Solid Edge SE2021SE2021MP3SE2021MP3 or later
Remediation & Mitigation
0/4
Do now
0/1WORKAROUNDDo not open Solid Edge files (PAR, DFT, XML) from unknown or untrusted sources
Schedule — requires maintenance window
0/2Patching may require device reboot — plan for process interruption
Solid Edge SE2020
HOTFIXUpdate Solid Edge SE2020 to SE2020MP13 or later
Solid Edge SE2021
HOTFIXUpdate Solid Edge SE2021 to SE2021MP3 or later
Long-term hardening
0/1HARDENINGImplement defense-in-depth security practices: network segmentation, application whitelisting, and least-privilege access for engineering workstations
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/a392cda9-9875-4747-b5c5-747ef7bf5ba9