Siemens Solid Edge

Plan PatchCVSS 7.5ICS-CERT ICSA-25-317-14Nov 11, 2025
Siemens
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

Solid Edge SE2025 performs improper certificate validation when connecting to the License Service endpoint. This allows an unauthenticated remote attacker positioned on the network to perform man-in-the-middle attacks against license validation communications.

What this means
What could happen
An attacker on the network could intercept and modify license validation communications between Solid Edge and the license service, potentially leading to unauthorized software usage or denial of license services to legitimate users.
Who's at risk
Engineering and design organizations using Siemens Solid Edge SE2025 for computer-aided design (CAD) and product development. The vulnerability affects license validation, which could impact design teams relying on valid software licensing.
How it could be exploited
An attacker with network access between the Solid Edge client and the License Service endpoint could perform a man-in-the-middle attack by intercepting the unvalidated certificate connection. The attacker can impersonate the license service and intercept or manipulate license data without being detected.
Prerequisites
  • Network access to traffic between Solid Edge client and License Service endpoint
  • Ability to intercept network traffic (man-in-the-middle position)
  • Solid Edge SE2025 version earlier than 225.0 Update 11
remotely exploitableno authentication requiredlow complexitycertificate validation bypass
Exploitability
Unlikely to be exploited — EPSS score 0.0%
Affected products (1)
ProductAffected VersionsFix Status
Solid Edge SE2025<V225.0 Update 11225.0 Update 11
Remediation & Mitigation
0/4
Do now
0/1
WORKAROUNDRestrict network access to the License Service endpoint to only authorized Solid Edge clients and configure firewall rules to monitor license service traffic
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Solid Edge SE2025 to version 225.0 Update 11 or later
Long-term hardening
0/2
HARDENINGImplement network segmentation to isolate Solid Edge systems from untrusted networks
HARDENINGMonitor network traffic for unauthorized connections or anomalies related to license service communications
API: /api/v1/advisories/b070b0ea-3242-4909-902f-45f683853cd8

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.

Siemens Solid Edge | CVSS 7.5 - OTPulse