CVE-2021-41537

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in Solid Edge SE2021 allows attackers to execute arbitrary code by tricking users into opening malicious OBJ files. This affects all versions of Solid Edge SE2021 before SE2021MP8. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Solid Edge SE2021
Versions: All versions before SE2021MP8
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in OBJ file parsing functionality; requires user to open malicious OBJ file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Solid Edge process, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or arbitrary code execution when a user opens a malicious OBJ file, potentially leading to malware installation.

🟢

If Mitigated

Limited impact if proper application whitelisting and file validation are in place, with potential for application crash.

🌐 Internet-Facing: LOW - Requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, but requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious OBJ file; no public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SE2021MP8

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf

Restart Required: Yes

Instructions:

1. Download Solid Edge SE2021 Maintenance Pack 8 (SE2021MP8) from Siemens support portal. 2. Close all Solid Edge applications. 3. Run the installer with administrative privileges. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Block OBJ file extensions

windows

Prevent Solid Edge from opening OBJ files via group policy or application restrictions.

Group Policy: Computer Configuration > Administrative Templates > Windows Components > File Explorer > Set default associations: .obj=notepad.exe

Application control policies

windows

Implement application whitelisting to restrict execution of Solid Edge to trusted locations only.

🧯 If You Can't Patch

  • Implement strict email filtering to block OBJ attachments and educate users about suspicious files.
  • Use endpoint detection and response (EDR) tools to monitor for suspicious Solid Edge process behavior.

🔍 How to Verify

Check if Vulnerable:

Check Solid Edge version: Open Solid Edge > Help > About Solid Edge. If version is earlier than SE2021MP8, system is vulnerable.

Check Version:

wmic product where name="Solid Edge SE2021" get version

Verify Fix Applied:

Verify version shows SE2021MP8 or later in Help > About Solid Edge dialog.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of Solid Edge when opening OBJ files
  • Unusual process creation from Solid Edge executable

Network Indicators:

  • Outbound connections from Solid Edge process to suspicious IPs

SIEM Query:

EventID=1000 AND Source="Solid Edge" AND FaultingModule LIKE "%obj%"

🔗 References

📤 Share & Export