OTPulse

Stack Overflow Vulnerability in Xpedition Layout Browser

Plan Patch7.8SSA-829656Oct 10, 2023
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

Xpedition Layout Browser contains a stack overflow vulnerability triggered when the application reads a malicious PCB format file. If a user opens a crafted malicious file, the application may crash or allow arbitrary code execution with user privileges on the engineering workstation.

What this means
What could happen
A user who opens a malicious PCB file in Xpedition Layout Browser could experience a crash or allow an attacker to execute arbitrary code on the engineering workstation.
Who's at risk
PCB design teams and electrical engineers who use Siemens Xpedition Layout Browser for circuit board layout and design work. This affects any organization using the affected product versions for electronic device development, including manufacturers of industrial control equipment, power systems, and other electronic products.
How it could be exploited
An attacker creates a malicious PCB file with a crafted stack overflow payload, then tricks or socially engineers a design engineer or PCB technician into opening the file. When opened in the vulnerable version of Xpedition Layout Browser, the application reads the malicious file, triggers a stack overflow, and could allow code execution in the context of the user running the application.
Prerequisites
  • User interaction required: the target user must open a malicious PCB file
  • Local file system write access or ability to deliver malicious PCB file to the engineering workstation
  • Vulnerable version of Xpedition Layout Browser (< VX.2.14) installed
Requires user interaction (file open)Low complexity attackAffects engineering workstationsArbitrary code execution possibleActively exploited in the wild (KEV status)
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
Xpedition Layout BrowserAll versions < VX.2.14VX.2.14
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Xpedition Layout Browser to version VX.2.14 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/24bab7de-1a24-4903-bf98-b5946a992d0a