Siemens NX
Plan Patch7.8ICS-CERT ICSA-24-228-09Aug 13, 2024
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
NX before V2406.3000 contains an out-of-bounds read vulnerability in the PRT file parser. If a user opens a malicious PRT file, the application may crash or, potentially, allow arbitrary code execution on the user's workstation. Siemens has released version 2406.3000 which fixes this issue. The vulnerability requires user interaction and cannot be exploited remotely or without the file being opened.
What this means
What could happen
A user opening a malicious PRT file in NX could crash the application or, in a worst case, allow an attacker to run code on the engineering workstation with the privileges of the user who opened the file.
Who's at risk
Engineering teams and CAD operators who use NX (including student versions) are affected. NX is a design and manufacturing software tool; the risk is primarily to the engineering workstations where NX runs, not to production control systems directly. However, if an engineer's workstation is compromised, it could be used as a stepping stone to access the broader network or introduce malicious designs into manufacturing processes.
How it could be exploited
An attacker sends a malicious PRT (part) file to a user or places it on a file share. When the user opens the file in NX, the out-of-bounds read is triggered, causing either a denial of service (crash) or potentially arbitrary code execution on the workstation. This requires user interaction—the file must be opened deliberately.
Prerequisites
- User interaction required to open a malicious PRT file
- User must have NX installed (versions before 2406.3000)
- Attacker must deliver the malicious file via email, file share, or other means
User interaction required (lowers risk)Requires file delivery mechanism (social engineering)Potential for code execution on workstationNo active exploitation reported
Exploitability
Low exploit probability (EPSS 0.2%)
Affected products (1)
ProductAffected VersionsFix Status
NX<V2406.30002406.3000
Remediation & Mitigation
0/3
Do now
0/1WORKAROUNDDo not open PRT files from untrusted or unknown sources
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate NX to version 2406.3000 or later
Long-term hardening
0/1HARDENINGEducate users to avoid opening unexpected PRT files and to verify the source of any such files before opening
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/ba15155b-3eee-4414-9fcf-56ec4ecf88e7