OTPulse

X_T File Parsing Vulnerabilities in Parasolid

Plan Patch7.8SSA-190839Sep 12, 2023
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Parasolid is vulnerable to out-of-bounds write vulnerabilities in X_T file parsing. When an affected version reads a malicious X_T format file, an attacker can execute arbitrary code in the context of the application. Affected versions: V34.1 before 34.1.258, V35.0 before 35.0.253 or 35.0.260, V35.1 before 35.1.184 or 35.1.246, V36.0 before 36.0.142 or 36.0.156. Siemens has released patches for all affected versions.

What this means
What could happen
An attacker could trick an engineer into opening a malicious X_T design file, which would execute code on the engineering workstation with the privileges of the user. This could compromise the workstation and allow access to design files, intellectual property, or downstream systems.
Who's at risk
Engineering teams using Parasolid (a CAD/modeling kernel used in product design and manufacturing planning) across V34.1, V35.0, V35.1, and V36.0. This affects companies in manufacturing, automotive, aerospace, machinery, and heavy equipment design that rely on Parasolid for 3D geometry modeling.
How it could be exploited
An attacker crafts a malicious X_T format file (a Parasolid geometry model format) that exploits an out-of-bounds write vulnerability. The file is delivered to an engineer via email or planted on a network share. When the engineer opens the file in Parasolid, the vulnerability is triggered and the attacker's code runs in the process context.
Prerequisites
  • User interaction: engineer must open a malicious X_T file
  • Affected version of Parasolid installed on the engineering workstation
Low complexity exploitationUser interaction requiredAffects engineering workstations and intellectual propertyOut-of-bounds write allows code execution
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (7)
7 with fix
ProductAffected VersionsFix Status
Parasolid V34.1< V34.1.25834.1.258
Parasolid V35.0< V35.0.25335.0.253
Parasolid V35.0< V35.0.26035.0.260
Parasolid V35.1< V35.1.18435.1.184
Parasolid V35.1< V35.1.24635.1.246
Parasolid V36.0< V36.0.14236.0.142
Parasolid V36.0< V36.0.15636.0.156
Remediation & Mitigation
0/6
Schedule — requires maintenance window
0/4

Patching may require device reboot — plan for process interruption

Parasolid V34.1
HOTFIXUpdate Parasolid V34.1 to version 34.1.258 or later
Parasolid V35.0
HOTFIXUpdate Parasolid V35.0 to version 35.0.253 or 35.0.260 or later
Parasolid V35.1
HOTFIXUpdate Parasolid V35.1 to version 35.1.184 or 35.1.246 or later
Parasolid V36.0
HOTFIXUpdate Parasolid V36.0 to version 36.0.142 or 36.0.156 or later
Long-term hardening
0/2
HARDENINGTrain engineers to avoid opening X_T files from untrusted or unexpected sources and to verify file origins before opening
HARDENINGConsider restricting file access permissions on shared network drives to limit distribution of malicious files
↑↓ Navigate · Esc Close
API: /api/v1/advisories/d575dac2-be9d-4cf0-a43d-10f2c6672ad9
X_T File Parsing Vulnerabilities in Parasolid | CVSS 7.8 - OTPulse