Siemens Simcenter Femap and Parasolid
Siemens Parasolid and Simcenter Femap are affected by multiple file parsing vulnerabilities in X_T file format readers. These include buffer overflow (CWE-787), out-of-bounds read (CWE-125), and undefined behavior (CWE-824) vulnerabilities. If a user opens a malicious X_T file, an attacker can execute arbitrary code in the context of the application and user account. Affected versions: Parasolid V33.1 (<33.1.262), V34.0 (<34.0.252), V34.1 (<34.1.242), V35.0 (<35.0.161); Simcenter Femap V2022.1 (<2022.1.3), V2022.2 (<2022.2.2). These are not remotely exploitable and no public exploits currently exist.
- User must open a malicious X_T file with Simcenter Femap or Parasolid
- File must be delivered via email attachment, download link, or USB—social engineering attack
- No special credentials or network access required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9a622b67-ebc0-4412-ab11-1c6295be89d8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.