OTPulse

Siemens Solid Edge

Plan Patch7.5ICS-CERT ICSA-25-317-14Nov 11, 2025
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

Solid Edge SE2025 contains improper certificate validation in its connection to the License Service endpoint. This weakness allows an unauthenticated attacker positioned on the network between the Solid Edge client and License Service to perform man-in-the-middle attacks, intercept communications, and potentially steal or modify data. The vulnerability affects all versions before V225.0 Update 11.

What this means
What could happen
An attacker on the network between a Solid Edge client and its License Service could intercept communications and perform a man-in-the-middle attack, potentially gaining access to sensitive data or injecting malicious content into the licensing connection.
Who's at risk
CAD/design engineers and workstations running Solid Edge SE2025 for 3D design and product engineering. Any organization using Solid Edge for design work should apply the patch. Environments relying on cloud-based or remote License Service connections are at higher risk.
How it could be exploited
An attacker positioned on the network path between Solid Edge SE2025 and the License Service endpoint exploits improper certificate validation. Since the client does not properly validate the server's SSL/TLS certificate, the attacker can present a fraudulent certificate, intercept the connection, and eavesdrop on or modify licensing data and communications.
Prerequisites
  • Network position between Solid Edge client and License Service (on-path attacker, e.g., same subnet, compromised gateway, or DNS hijacking)
  • Target running vulnerable Solid Edge SE2025 version prior to V225.0 Update 11
  • No special credentials or authentication required
Remotely exploitableNo authentication requiredLow complexity attack (man-in-the-middle)Improper certificate validation flawAffects design/engineering software used in manufacturing and product development
Exploitability
Low exploit probability (EPSS 0.0%)
Affected products (1)
ProductAffected VersionsFix Status
Solid Edge SE2025<V225.0 Update 11225.0 Update 11
Remediation & Mitigation
0/3
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Solid Edge SE2025 to V225.0 Update 11 or later
Long-term hardening
0/2
HARDENINGImplement network segmentation to isolate Solid Edge workstations from untrusted networks and enforce firewall rules to restrict outbound connections to known License Service endpoints only
HARDENINGDeploy VPN or encrypted tunnel for any remote Solid Edge clients connecting to the License Service to prevent on-path attacks
↑↓ Navigate · Esc Close
API: /api/v1/advisories/b070b0ea-3242-4909-902f-45f683853cd8