OTPulse

DWG File Parsing Vulnerability in Solid Edge before SE2022MP9

Plan Patch7.8SSA-258115Oct 11, 2022
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Solid Edge is affected by a heap overflow vulnerability in DWG file parsing (CWE-122). When a user opens a malicious DWG file, the vulnerability can be leveraged to execute arbitrary code in the context of the application. This affects all versions prior to SE2022MP9.

What this means
What could happen
An attacker could trick a user into opening a malicious DWG file in Solid Edge, allowing them to run arbitrary code on the engineering workstation with the privileges of the user running the application.
Who's at risk
Engineering and design teams at manufacturing, utility, and infrastructure facilities who use Solid Edge for CAD work, particularly those designing or modifying control system mechanical components, enclosures, or equipment layouts. Users of older Solid Edge versions on workstations that may interact with external design files are at risk.
How it could be exploited
An attacker crafts a malicious DWG file and sends it to an engineer or designer. When the user opens the file in an affected version of Solid Edge, the heap overflow is triggered during file parsing, allowing code execution on the workstation. This could compromise the workstation used to design or modify control system configurations.
Prerequisites
  • User must open a malicious DWG file in Solid Edge
  • Solid Edge version must be prior to SE2022MP9
  • User interaction required (file must be opened manually)
requires user interaction (file open)affects engineering workstations used in OT environmentslow exploit complexitycode execution in user context
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
Solid EdgeAll Versions < SE2022MP9SE2022MP9
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Solid Edge to SE2022MP9 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/eb5b9c44-77aa-4ad6-aef6-f7aad1998a1a