OTPulse

Siemens Solid Edge

Plan Patch7.8ICS-CERT ICSA-23-166-09Jun 13, 2023
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Solid Edge SE2023 is affected by a file parsing vulnerability in the Open Design Alliance Drawings SDK. When a user opens a malicious DWG file, the vulnerability can cause the application to crash or allow arbitrary code execution. The vulnerability is triggered during file parsing and requires user interaction to exploit. Siemens has released Solid Edge SE2023 V223.0 Update 5 to address this issue.

What this means
What could happen
An attacker could crash Solid Edge or execute arbitrary code on an engineering workstation if a user opens a malicious DWG file. This could compromise design files or allow attackers to establish persistence on machines used to develop and modify control system configurations.
Who's at risk
Design engineers and CAD operators at utilities and manufacturers who use Siemens Solid Edge SE2023 to create or modify industrial automation designs, control logic, or SCADA graphics. Risk is highest if engineering workstations are networked to the production environment or have access to control system databases.
How it could be exploited
An attacker crafts a malicious DWG (AutoCAD drawing) file and tricks or socially engineers a Solid Edge user into opening it. The file parsing vulnerability in the Open Design Alliance Drawings SDK is triggered during file load, causing a crash or arbitrary code execution with the privileges of the user running Solid Edge.
Prerequisites
  • User interaction required: victim must open the malicious DWG file
  • Attacker must deliver the file via email, file share, or social engineering
  • Vulnerable version of Solid Edge SE2023 (below 223.0 Update 5) must be installed
Requires user interaction (file open)Low technical complexityNo authentication requiredCould affect engineering workstations with access to sensitive designs
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
Solid Edge SE2023<V223.0 Update 5223.0 Update 5
Remediation & Mitigation
0/3
Do now
0/1
WORKAROUNDDo not open DWG or other design files from untrusted sources (unknown senders, unsolicited emails, unverified file shares)
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Solid Edge SE2023 to version 223.0 Update 5 or later
Long-term hardening
0/1
HARDENINGEducate users on email phishing and social engineering tactics used to distribute malicious files
↑↓ Navigate · Esc Close
API: /api/v1/advisories/c4edd9b0-2f96-48b0-b346-5651cd8391b6
Siemens Solid Edge | CVSS 7.8 - OTPulse