Siemens Solid Edge

Plan PatchCVSS 7.8ICS-CERT ICSA-25-289-05Oct 14, 2025
Siemens
Attack path
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Solid Edge (SE2024 and SE2025) contains multiple file parsing vulnerabilities in the PRT file format handler that can be triggered when the application reads specially crafted PRT files. These vulnerabilities (CWE-787 out-of-bounds write, CWE-125 out-of-bounds read) could allow an attacker to crash the application or execute arbitrary code if a user opens a malicious PRT file. Exploitation requires user interaction to open the file.

What this means
What could happen
If an engineer opens a malicious PRT file in Solid Edge, the application could crash, causing loss of work and downtime, or an attacker could run arbitrary code on the engineering workstation with the privileges of the user running Solid Edge.
Who's at risk
Engineering organizations using Siemens Solid Edge for product design, CAD work, and part file management. This affects design engineers and CAD technicians who work with PRT file formats on Windows engineering workstations. Organizations that receive PRT files from external suppliers or partners are at higher risk.
How it could be exploited
An attacker crafts a malicious PRT (part) file and delivers it to an engineer (e.g., via email, file sharing, or a compromised supplier website). When the engineer opens the file in Solid Edge to view or edit the design, the vulnerable parser processes the malformed file structure, triggering a buffer overflow or out-of-bounds read that crashes the application or executes attacker code on the workstation.
Prerequisites
  • User must open a malicious PRT file in an affected Solid Edge version
  • The attacker must be able to deliver the crafted file to the target user (email, file share, web download, or supply chain compromise)
user interaction required to trigger (file must be opened)low attack complexityaffects engineering workstations which may have access to design systems and networks
Exploitability
Unlikely to be exploited — EPSS score 0.0%
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
Solid Edge SE2024<V224.0 Update 14224.0 Update 14
Solid Edge SE2025<V225.0 Update 6225.0 Update 6
Remediation & Mitigation
0/4
Do now
0/1
WORKAROUNDDo not open PRT files from untrusted sources or unverified senders
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

Solid Edge SE2024
HOTFIXUpdate Solid Edge SE2024 to version 224.0 Update 14 or later
Solid Edge SE2025
HOTFIXUpdate Solid Edge SE2025 to version 225.0 Update 6 or later
Long-term hardening
0/1
HARDENINGImplement email filtering and user awareness training to reduce social engineering risk from malicious file attachments
API: /api/v1/advisories/25fb3808-146f-4ab6-a8b4-34caadcc5cb4

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.