Siemens Solid Edge
Solid Edge is affected by a heap overflow vulnerability that can be triggered when the application reads DWG (AutoCAD drawing) files. If a user is tricked into opening a malicious DWG file, an attacker can execute arbitrary code in the context of the Solid Edge process. The vulnerability is not remotely exploitable and requires user interaction. Siemens has released a patch in SE2022MP9 and recommends updating to the latest version. As a mitigation, users should avoid opening DWG files from untrusted sources.
- User must open a malicious DWG file in Solid Edge
- Social engineering or file delivery mechanism required to get the file to the user
- User must be running a vulnerable version (earlier than SE2022MP9)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/44c140ff-c2cf-46e9-93b4-dc1a389287e8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.