Siemens Solid Edge
Siemens Solid Edge contains multiple memory corruption vulnerabilities (CWE-122, CWE-125, CWE-121) in its PAR file parser. When a user opens a specially crafted PAR file, the application may crash or allow arbitrary code execution in the context of the current user. The vulnerabilities are triggered during file parsing and affect versions prior to V224.0 Update 2, Update 4, or Update 5 depending on the specific CVE. Exploitation requires user interaction (opening a malicious file) and is not remotely exploitable.
- User must open a malicious PAR file in Solid Edge
- User interaction required (social engineering or phishing to deliver the file)
- Vulnerable version of Solid Edge must be installed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e472fdd5-6945-4426-907c-43afbdee4492Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.