Siemens Solid Edge
Plan PatchCVSS 7.8ICS-CERT ICSA-26-043-05Nov 17, 2025
Siemens
Attack path
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Solid Edge contains an out-of-bounds read vulnerability in the PS/IGES Parasolid Translator Component when processing IGS (IGES format) files. If a user opens a malicious IGS file, the application may crash or arbitrary code may be executed with user privileges. The vulnerability is triggered only when a user explicitly opens a crafted IGS file.
What this means
What could happen
An attacker could craft a malicious IGS (IGES format) file that, when opened in Solid Edge, crashes the application or executes arbitrary code on the engineering workstation running the software.
Who's at risk
Engineering and design departments that use Solid Edge for CAD/CAM design work. This affects workstations running Solid Edge, particularly those where users receive or exchange IGS format files with external parties or from untrusted sources.
How it could be exploited
An attacker creates a malicious IGS file and tricks a Solid Edge user into opening it (via email, shared storage, or social engineering). The out-of-bounds read in the Parasolid Translator component is triggered, causing a crash or, potentially, code execution with the privileges of the user who opened the file.
Prerequisites
- User interaction required: the victim must be tricked into opening a malicious IGS file
- Solid Edge must be installed on the workstation
- The attacker needs ability to deliver the malicious file to the target (email, web, shared drive, etc.)
Requires user interaction (file open)Low complexity attackCould lead to code execution on engineering workstationIGS files are common in design workflows
Exploitability
Unlikely to be exploited — EPSS score 0.0%
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
PS/IGES Parasolid Translator Component< 29.0.25829.0.258
Solid Edge<V226.00 Update 03226.00 Update 03
Remediation & Mitigation
0/3
Do now
0/2WORKAROUNDRestrict file execution from untrusted sources; disable auto-opening of IGS files from email and web downloads
HARDENINGTrain users not to open IGS files from unknown or untrusted sources
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
Solid Edge
HOTFIXUpdate Solid Edge to version 226.00 Update 03 or later
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/ca1f232c-0a66-4089-85be-870f4231d37bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.