Siemens Simcenter Femap
Plan Patch7.8ICS-CERT ICSA-22-132-14May 10, 2022
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Siemens Simcenter Femap versions before 2022.2 contain an out-of-bounds write vulnerability in the .NEU file parser. When a user opens a malicious .NEU file, the vulnerability allows an attacker to execute arbitrary code in the context of the Femap application process. The vulnerability requires user interaction and cannot be exploited remotely.
What this means
What could happen
An attacker could execute arbitrary code with the privileges of the user running Simcenter Femap if a malicious .NEU file is opened, potentially compromising the engineering workstation and any designs or data it contains.
Who's at risk
Engineering and design teams using Siemens Simcenter Femap for finite element analysis and mechanical design. This affects workstations in automotive, aerospace, manufacturing, and energy sectors where Femap is used for CAD/CAM simulation work.
How it could be exploited
An attacker creates a malicious .NEU file and tricks a user into opening it in Simcenter Femap (via email, file sharing, or other social engineering). The malicious file triggers an out-of-bounds write vulnerability during file parsing, allowing code execution in the context of the Femap process on the workstation.
Prerequisites
- User must open a malicious .NEU file in Simcenter Femap
- User interaction required (cannot exploit unattended)
- Affected Femap version must be less than 2022.2
User interaction required (reduces but does not eliminate risk)Local exploitation only (requires workstation access or social engineering)Engineering workstations may not receive security updates as frequently as IT infrastructureAffects design data integrity and engineer credentials
Exploitability
Low exploit probability (EPSS 0.4%)
Affected products (1)
ProductAffected VersionsFix Status
Simcenter Femap<V2022.22022.2
Remediation & Mitigation
0/3
Do now
0/2WORKAROUNDDo not open .NEU files from untrusted sources or unknown origins
HARDENINGTrain users to avoid opening unsolicited file attachments and verify file sources before opening in Femap
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate Simcenter Femap to version 2022.2 or later
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/3d117fcd-733e-476c-9efa-818a96895309