File Parsing Vulnerability in Simcenter Femap Before V2512

Plan PatchCVSS 7.8SSA-512988Dec 12, 2025
Siemens
Attack path
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Simcenter Femap versions before V2512 contain an uninitialized memory vulnerability that is triggered when the application reads files in SLDPRT format. An attacker could craft a malicious SLDPRT file that, when opened by a user, allows remote code execution in the context of the Femap process.

What this means
What could happen
An attacker could execute arbitrary code on an engineering workstation running Simcenter Femap by sending a malicious CAD file, potentially compromising design data or using the workstation as a pivot point into the OT network.
Who's at risk
Engineering teams and CAD workstations using Simcenter Femap for structural analysis, finite element modeling, or product design. This affects companies in manufacturing, aerospace, automotive, and utilities that rely on Femap for engineering design and simulation.
How it could be exploited
An attacker crafts a malicious SLDPRT (SolidWorks part) file that triggers an uninitialized memory condition when opened in Femap. When an engineer opens the file, the vulnerability allows the attacker to execute arbitrary commands with the privileges of the Femap process and the logged-in user.
Prerequisites
  • User must open a malicious SLDPRT file in Simcenter Femap
  • Femap version earlier than V2512 must be installed
  • Social engineering or file transfer mechanism to deliver the malicious file
User interaction required (file opening)Low complexity attackHigh CVSS score (7.8)Can be delivered via email or file sharing
Exploitability
Unlikely to be exploited — EPSS score 0.0%
Affected products (1)
ProductAffected VersionsFix Status
Simcenter Femap< 25122512
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Simcenter Femap to version V2512 or later
API: /api/v1/advisories/89359112-fb3e-4574-b195-22d07de9e58e

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.