OTPulse

CELL File Parsing Vulnerability in Tecnomatix RobotExpert

Plan Patch7.8SSA-163226Apr 13, 2021
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Tecnomatix RobotExpert versions prior to 16.1 contain a buffer overflow vulnerability (CWE-787) in the CELL file parser. When a user opens a crafted malicious CELL file, the vulnerability can be triggered to crash the application or execute arbitrary code on the host system with user privileges. The attack requires social engineering to trick the user into opening an untrusted file.

What this means
What could happen
An attacker could craft a malicious CELL file that, when opened in RobotExpert, crashes the application or executes arbitrary code on the engineer's workstation with the privileges of that user.
Who's at risk
Manufacturing engineers and automation designers using Tecnomatix RobotExpert on Windows workstations for robot simulation and programming are at risk. Any organization using RobotExpert versions prior to 16.1 for industrial automation design should prioritize patching.
How it could be exploited
An attacker creates a malicious CELL file and tricks an engineer into opening it with RobotExpert (via email, shared folder, or social engineering). When the application parses the file, the memory corruption vulnerability is triggered, allowing code execution on the engineer's machine.
Prerequisites
  • User interaction required: engineer must open a malicious CELL file in RobotExpert
  • RobotExpert version < 16.1 must be installed
  • Access to deliver the file to the target engineer (e.g., email, network share)
requires user interaction (social engineering vector)low complexity attackaffects engineering workstations with potential access to production systemsmemory corruption vulnerability (CWE-787)
Exploitability
Low exploit probability (EPSS 0.4%)
Affected products (1)
ProductAffected VersionsFix Status
Tecnomatix RobotExpert< V16.116.1
Remediation & Mitigation
0/3
Do now
0/1
WORKAROUNDInstruct engineers to avoid opening CELL files from untrusted or unknown sources until patched
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Tecnomatix RobotExpert to version 16.1 or later
Long-term hardening
0/1
HARDENINGImplement file transfer controls to restrict receipt of CELL files from external sources
↑↓ Navigate · Esc Close
API: /api/v1/advisories/04a70707-7806-41a1-ab12-35874c11a3af
CELL File Parsing Vulnerability in Tecnomatix RobotExpert | CVSS 7.8 - OTPulse