OTPulse

Siemens Tecnomatix Plant Simulation

Plan Patch7.8ICS-CERT ICSA-21-131-08May 11, 2021
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Siemens Tecnomatix Plant Simulation versions below 16.0.5 contain buffer overflow vulnerabilities (CWE-121, CWE-119) in SPP file parsing that can be triggered when a user opens a malicious file. Exploitation could cause application crash, data extraction, or arbitrary code execution on the engineering workstation. The vulnerability requires user interaction and is not remotely exploitable.

What this means
What could happen
If an operator opens a malicious SPP file in Tecnomatix Plant Simulation, an attacker could crash the application, extract sensitive data from the workstation, or execute arbitrary code with the same privileges as the user running the simulation software.
Who's at risk
Plant simulation engineers and process designers at manufacturing, water treatment, and utility facilities who use Siemens Tecnomatix Plant Simulation for offline modeling and engineering work. Primarily affects engineering workstations, not active control systems.
How it could be exploited
An attacker sends or tricks an operator into opening a malicious SPP (simulation project) file. When opened in the vulnerable application, the file triggers a buffer overflow that could allow arbitrary code execution on the engineering workstation or cause the application to crash.
Prerequisites
  • User must open a malicious SPP file with Tecnomatix Plant Simulation
  • Vulnerable version (below 16.0.5) must be installed on the workstation
  • No special credentials or network access required
low complexity attack (file open)requires user interactionbuffer overflow vulnerabilitycan lead to arbitrary code executionno public exploit available
Exploitability
Low exploit probability (EPSS 0.9%)
Affected products (1)
ProductAffected VersionsFix Status
Tecnomatix Plant Simulation<V16.0.516.0.5
Remediation & Mitigation
0/4
Do now
0/2
WORKAROUNDDo not open SPP files from untrusted or unknown sources
HARDENINGEducate operators on recognizing phishing emails and unsolicited attachments containing SPP files
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Tecnomatix Plant Simulation to version 16.0.5 or later
Long-term hardening
0/1
HARDENINGIsolate engineering workstations running Tecnomatix from internet access and restrict file transfer sources
↑↓ Navigate · Esc Close
API: /api/v1/advisories/3de5cab7-8c43-47d5-a0c0-1d8075b96f72
Siemens Tecnomatix Plant Simulation | CVSS 7.8 - OTPulse