Siemens PADS Standard/Plus Viewer
Monitor7.8ICS-CERT ICSA-22-195-08Jul 12, 2022
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Siemens PADS Standard/Plus Viewer contains multiple memory corruption vulnerabilities in its PCB file parser that can be triggered when a user opens a specially crafted PCB design file. These vulnerabilities could allow an attacker to execute arbitrary code in the context of the application user. The vulnerabilities affect all versions of PADS Standard and Plus Viewer with no vendor fix available.
What this means
What could happen
An attacker could execute arbitrary code on an engineer's workstation if they trick the user into opening a malicious PCB design file in PADS Viewer, potentially compromising design data, credentials, and access to connected design or manufacturing systems.
Who's at risk
PCB design engineers and EDA (Electronic Design Automation) teams using Siemens PADS Standard or Plus Viewer for circuit board design and layout. This affects organizations that design or modify electronic components or boards as part of equipment manufacturing or customization.
How it could be exploited
An attacker creates a malicious PCB design file (in PADS-compatible format) with crafted content that triggers a memory corruption vulnerability. The attacker sends this file to an engineer via email or hosts it on a website. When the engineer opens the file with PADS Standard/Plus Viewer, the memory corruption is triggered, allowing the attacker to run code with the privileges of the engineer's user account.
Prerequisites
- User interaction required: engineer must open a malicious PCB design file
- PADS Standard/Plus Viewer installed on the workstation
- Access to send files to the target user (email, file sharing, etc.)
Requires user interaction (file open)Memory corruption vulnerabilities (CWE-125, CWE-787, CWE-119)No patch availableAffects engineering workstations with access to sensitive design data
Exploitability
Low exploit probability (EPSS 0.4%)
Affected products (1)
ProductAffected VersionsFix Status
PADS Standard/Plus ViewerAll versionsNo fix (EOL)
Remediation & Mitigation
0/5
Do now
0/2WORKAROUNDDo not open PCB design files from untrusted or unexpected sources. Verify the sender and legitimacy of any design files before opening them in PADS Viewer.
HARDENINGRestrict file sharing and email attachments from external parties to PCB designers and engineering staff. Use email filtering to block suspicious PCB files or executable content.
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HARDENINGRun PADS Viewer with minimal required privileges (non-administrator user account) to limit the scope of code execution if the vulnerability is exploited.
Mitigations - no patch available
0/2PADS Standard/Plus Viewer has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGImplement network segmentation to isolate engineering workstations from general corporate networks, limiting lateral movement if a workstation is compromised.
HARDENINGMonitor and log all file access and application activity on engineering workstations to detect suspicious behavior.
CVEs (20)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/4ecda4e5-e324-4e41-9e72-c0c986180ea0