Multiple PAR and ASM File Parsing Vulnerabilities in Solid Edge
Plan Patch7.8SSA-173615Jul 13, 2021
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Siemens Solid Edge contains multiple heap-based buffer overflow vulnerabilities in PAR and ASM file parsing. When a user opens a malicious PAR or ASM file, the parser can overflow and potentially execute arbitrary code or crash the application.
What this means
What could happen
An attacker could craft a malicious Solid Edge design file (PAR or ASM format) that, when opened, executes arbitrary code or crashes the application. This affects design and engineering operations if Solid Edge is used in OT environments.
Who's at risk
Engineering and design teams using Solid Edge SE2021 for CAD work, particularly in manufacturing, process design, or infrastructure engineering environments where OT systems interact with design workflows. This includes utilities and municipalities that use design software in their operational planning.
How it could be exploited
An attacker crafts a malicious PAR or ASM file and tricks a Solid Edge user into opening it (via email, file share, or other social engineering). The parser reads the file, triggers a heap buffer overflow in the file format handler, and executes attacker code in the context of the Solid Edge process.
Prerequisites
- User must open a malicious PAR or ASM file in Solid Edge
- Social engineering or file transfer mechanism needed to deliver the malicious file
Requires user interaction (file opening)Heap buffer overflow could allow code executionDesign file format vulnerabilities are difficult to detect visually
Exploitability
Low exploit probability (EPSS 0.4%)
Affected products (1)
ProductAffected VersionsFix Status
Solid Edge SE2021All Versions < SE2021MP5SE2021MP5
Remediation & Mitigation
0/3
Do now
0/2WORKAROUNDDisable or restrict file opening in Solid Edge for untrusted sources; enforce file source validation before opening
HARDENINGEducate users not to open PAR or ASM files from unknown or untrusted sources
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate Solid Edge SE2021 to SE2021MP5 or later
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/a7f8d4f0-b048-4bda-95fd-ba2b0fbc6616