Siemens Solid Edge

Plan PatchCVSS 7.8ICS-CERT ICSA-25-100-03Apr 8, 2025
Siemens
Attack path
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Solid Edge contains an out-of-bounds write vulnerability in its X_T file parser. When a user opens a specially crafted X_T file, the parser writes data beyond buffer bounds, allowing remote code execution in the context of the application. SE2024 versions before V224.0 Update 12 and SE2025 versions before V225.0 Update 3 are vulnerable. Exploitation requires user interaction—the victim must open the malicious file. No public exploitation has been reported.

What this means
What could happen
An attacker who tricks a user into opening a malicious file could execute code on the engineering workstation with full user privileges, potentially compromising project files, intellectual property, or the workstation itself.
Who's at risk
Engineering teams and design departments using Siemens Solid Edge for CAD work. Affects workstations running Solid Edge SE2024 (before Update 12) or SE2025 (before Update 3). Risk is highest in organizations where design files are shared externally or where users receive unsolicited files.
How it could be exploited
An attacker sends a specially crafted X_T file (Solid Edge native format) to a user via email or file sharing. When the user opens the file in Solid Edge, the parser triggers an out-of-bounds write in memory, allowing code execution in the context of the Solid Edge process running as that user.
Prerequisites
  • User interaction required: target user must open a malicious X_T file
  • Social engineering or delivery method to get the file to the user
  • Vulnerable version of Solid Edge installed on the workstation
User interaction required (social engineering vector)Out-of-bounds write in memory parserAffects engineering workstations which may contain intellectual property or project dataFile-based attack requires no network access
Exploitability
Unlikely to be exploited — EPSS score 0.1%
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
Solid Edge SE2024<V224.0 Update 12224.0 Update 12
Solid Edge SE2025<V225.0 Update 3225.0 Update 3
Remediation & Mitigation
0/5
Do now
0/1
WORKAROUNDDo not open X_T files from untrusted or unexpected sources without verification
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

Solid Edge SE2024
HOTFIXUpdate Solid Edge SE2024 to V224.0 Update 12 or later
Solid Edge SE2025
HOTFIXUpdate Solid Edge SE2025 to V225.0 Update 3 or later
Long-term hardening
0/2
HARDENINGTrain users to verify file sources before opening and to be cautious of unsolicited file attachments
HARDENINGImplement email controls to block or quarantine executable and design file attachments from external senders
API: /api/v1/advisories/4bd840b2-a4f4-403e-ba09-bd242fb23fdc

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.