CVE-2021-25665

7.8 HIGH

📋 TL;DR

This vulnerability in Simcenter STAR-CCM+ Viewer allows attackers to execute arbitrary code by exploiting improper validation of scene files. It affects all versions before V2021.2.1 and could lead to complete system compromise when malicious files are opened.

💻 Affected Systems

Products:
  • Simcenter STAR-CCM+ Viewer
Versions: All versions < V2021.2.1
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the starview+.exe application when parsing scene files. All default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining same privileges as the user running starview+.exe, potentially leading to lateral movement, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or remote code execution when users open malicious scene files, potentially leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact with proper network segmentation, least privilege, and file validation controls in place.

🌐 Internet-Facing: LOW - starview+.exe is typically not internet-facing, but could be exploited via web interfaces that process scene files.
🏢 Internal Only: HIGH - Internal users opening malicious scene files (via email, file shares, etc.) can trigger exploitation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious scene files. No public exploit code is available, but the vulnerability is well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2021.2.1 and later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-109294.pdf

Restart Required: Yes

Instructions:

1. Download V2021.2.1 or later from Siemens support portal. 2. Run installer with administrative privileges. 3. Restart affected systems. 4. Verify installation by checking version.

🔧 Temporary Workarounds

Restrict scene file execution

windows

Block execution of starview+.exe from untrusted locations or implement application whitelisting

Windows: Use AppLocker or Software Restriction Policies to restrict starview+.exe execution

File type association removal

windows

Remove file associations for scene files with starview+.exe to prevent automatic opening

Windows: assoc .scn=
Windows: ftype SimcenterSceneFile=

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems running vulnerable versions
  • Apply principle of least privilege: run starview+.exe with minimal user permissions

🔍 How to Verify

Check if Vulnerable:

Check Simcenter STAR-CCM+ Viewer version via Help > About or command line: starview+ --version

Check Version:

starview+ --version

Verify Fix Applied:

Verify version is V2021.2.1 or later and test opening known safe scene files

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of starview+.exe
  • Unexpected process creation from starview+.exe
  • Failed scene file parsing attempts

Network Indicators:

  • Unusual outbound connections from systems running starview+.exe
  • Scene file downloads from untrusted sources

SIEM Query:

Process:starview+.exe AND (EventID:1000 OR ParentProcess!="explorer.exe")

🔗 References

📤 Share & Export