Siemens Simcenter Femap before V2023.1
Plan Patch7.8ICS-CERT ICSA-23-047-06Feb 14, 2023
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Simcenter Femap before version 2023.1 is affected by out-of-bounds read and write vulnerabilities (CWE-125, CWE-787) triggered when the application processes X_T format files. If a user opens a malicious X_T file, an attacker can execute arbitrary code in the process context. Siemens has released version 2023.1 with fixes. Exploitation requires social engineering to convince a user to open a crafted file and is not remotely exploitable.
What this means
What could happen
An attacker could execute code with the privileges of the user running Simcenter Femap if a user opens a specially crafted X_T file, potentially compromising engineering workstations and design data used in system modeling and analysis.
Who's at risk
Engineering and design teams using Simcenter Femap (a finite element analysis and modeling tool) for mechanical design, simulation, and analysis work. This affects organizations in automotive, aerospace, manufacturing, and utilities that rely on CAD/simulation workflows.
How it could be exploited
An attacker crafts a malicious X_T (Parasolid) file and tricks a user into opening it in Simcenter Femap through social engineering (email attachment, shared file, etc.). When opened, the out-of-bounds read/write vulnerability is triggered, allowing code execution in the application's context on the engineer's workstation.
Prerequisites
- User with Simcenter Femap installed (typically engineering or analysis staff)
- User must be convinced to open a malicious X_T file
- Simcenter Femap version before 2023.1 must be installed
Local execution only (not remotely exploitable)Requires user interaction to open malicious fileSocial engineering / phishing attack vectorCan affect engineering design integrity and IP theft
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
Simcenter Femap<V2023.12023.1
Remediation & Mitigation
0/4
Do now
0/2WORKAROUNDInstruct users to avoid opening X_T files from untrusted sources and verify file origin before opening
HARDENINGImplement email filtering and attachment policies to block or flag X_T files from external sources
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate Simcenter Femap to version 2023.1 or later
Long-term hardening
0/1HARDENINGSegment engineering workstations from business network and restrict file sharing from untrusted sources
CVEs (2)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/a194f3c8-bb72-4392-8a3e-75194e70af04