OTPulse

File Parsing Vulnerability in Simcenter Femap Before V2512

Plan Patch7.8SSA-512988Dec 12, 2025
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Simcenter Femap versions before V2512 contain an uninitialized memory vulnerability triggered when reading SLDPRT format files. If a user opens a malicious file, an attacker can execute arbitrary code in the application's context.

What this means
What could happen
An engineer could be tricked into opening a malicious CAD file, allowing an attacker to run code on their engineering workstation with the same privileges as the user, potentially giving access to design files or sensitive process information stored on that system.
Who's at risk
Engineering and design teams who use Siemens Simcenter Femap for CAD/CAM work, finite element analysis, or process design activities. This affects workstations used for plant engineering, control system design, or equipment design—particularly anyone who receives or reviews external design files.
How it could be exploited
An attacker creates a malicious SLDPRT (SolidWorks part) file and sends it to an engineer via email or file-sharing service. When the engineer opens the file in Femap to review or process the design, uninitialized memory in the file parser is exploited, allowing arbitrary code execution on the workstation.
Prerequisites
  • User must open a malicious SLDPRT file using Femap
  • Femap version before 2512 must be installed
  • File must be opened by a user with access to engineering data or process design files
User interaction required (file must be opened)affects engineering workstationsallows code execution in user contextSLDPRT file format exploitation
Exploitability
Low exploit probability (EPSS 0.0%)
Affected products (1)
ProductAffected VersionsFix Status
Simcenter Femap< 25122512
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Simcenter Femap to version 2512 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/89359112-fb3e-4574-b195-22d07de9e58e