CVE-2021-27387

7.8 HIGH

📋 TL;DR

This vulnerability in Simcenter Femap allows attackers to execute arbitrary code by exploiting improper validation when parsing FEMAP files. Users of Simcenter Femap 2020.2 and 2021.1 before specific maintenance pack versions are affected. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Simcenter Femap
  • Simcenter Femap 2020.2
  • Simcenter Femap 2021.1
Versions: All versions of Simcenter Femap 2020.2 before V2020.2.MP3 and all versions of Simcenter Femap 2021.1 before V2021.1.MP3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the femap.exe application when parsing FEMAP files. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Femap process, potentially leading to data theft, system manipulation, or lateral movement.

🟠

Likely Case

Local code execution leading to privilege escalation, data exfiltration, or installation of persistent malware.

🟢

If Mitigated

Limited impact with proper network segmentation and least privilege principles, potentially only affecting the Femap application.

🌐 Internet-Facing: LOW - This requires local file access or user interaction with malicious files, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Internal users with access to Femap could exploit this vulnerability, especially if they can introduce malicious FEMAP files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious FEMAP file. No public exploit code is available, but the vulnerability is well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Simcenter Femap 2020.2 Maintenance Pack 3 (V2020.2.MP3) or later, Simcenter Femap 2021.1 Maintenance Pack 3 (V2021.1.MP3) or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-133038.pdf

Restart Required: Yes

Instructions:

1. Download the appropriate maintenance pack from Siemens support portal. 2. Close all Femap instances. 3. Run the maintenance pack installer. 4. Restart the system. 5. Verify the installation by checking the version.

🔧 Temporary Workarounds

Restrict FEMAP file handling

windows

Implement application whitelisting to restrict execution of femap.exe or implement file type restrictions to prevent opening untrusted FEMAP files.

User awareness training

all

Train users to only open FEMAP files from trusted sources and to be cautious of unexpected file attachments.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can run Femap and access FEMAP files.
  • Use application sandboxing or virtualization to isolate Femap from critical systems and data.

🔍 How to Verify

Check if Vulnerable:

Check Femap version via Help > About in the application or examine the executable properties.

Check Version:

Not applicable - check via GUI in Help > About menu

Verify Fix Applied:

Verify the version shows V2020.2.MP3 or later for 2020.2, or V2021.1.MP3 or later for 2021.1.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes of femap.exe
  • Unusual process creation from femap.exe
  • Access to suspicious FEMAP files

Network Indicators:

  • Outbound connections from femap.exe to unexpected destinations

SIEM Query:

Process creation where parent process contains 'femap.exe' AND (command line contains suspicious patterns OR destination IP is external)

🔗 References

📤 Share & Export