File Parsing Vulnerabilities in Simcenter Femap before V2022.2
Plan Patch7.8SSA-162616May 10, 2022
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Simcenter Femap versions before V2022.2 contain an out-of-bounds write vulnerability (CWE-787) triggered when reading malicious .NEU format files. If a user opens a crafted malicious file, an attacker could execute arbitrary code in the context of the Femap process.
What this means
What could happen
An attacker could execute arbitrary code on an engineering workstation if a user opens a malicious .NEU file, potentially compromising simulation data, design files, or enabling lateral movement to engineering networks and connected systems.
Who's at risk
Engineering teams and analysts who use Siemens Simcenter Femap for finite element analysis, CAD design, and simulation work. This affects organizations in manufacturing, energy, automotive, and infrastructure sectors that rely on engineering workstations for system design and analysis.
How it could be exploited
An attacker crafts a malicious .NEU format file and tricks an engineer into opening it in Simcenter Femap. The out-of-bounds write vulnerability is triggered during file parsing, allowing the attacker to inject and execute code with the privileges of the user running Femap.
Prerequisites
- User must open a malicious .NEU file in Simcenter Femap
- Social engineering or phishing to deliver the malicious file
- Simcenter Femap version prior to V2022.2 must be installed
low complexityuser interaction requiredaffects engineering workstations and design processes
Exploitability
Low exploit probability (EPSS 0.4%)
Affected products (1)
ProductAffected VersionsFix Status
Simcenter Femap< V2022.22022.2
Remediation & Mitigation
0/3
Do now
0/1WORKAROUNDRestrict file opening capabilities in Femap to trusted sources only; implement file validation policies
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate Simcenter Femap to version 2022.2 or later
Long-term hardening
0/1HARDENINGSegment engineering workstations from production networks and critical OT systems
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/d9f3d4cd-f68e-45a1-9534-548d90961754