CVE-2021-46151

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted NEU files in Simcenter Femap. An attacker could execute arbitrary code with the privileges of the current user. Affects Simcenter Femap V2020.2 and V2021.1 users.

💻 Affected Systems

Products:
  • Simcenter Femap
Versions: V2020.2 (All versions), V2021.1 (All versions)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the NEU file parser; any installation parsing these files is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or system compromise when a user opens a malicious NEU file, potentially leading to data exfiltration.

🟢

If Mitigated

Limited impact if proper file validation and user privilege restrictions are in place, though file parsing could still crash the application.

🌐 Internet-Facing: LOW - This requires user interaction to open a malicious file, not directly exploitable over network services.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious files via phishing or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious NEU file; no authentication bypass needed but social engineering likely required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Simcenter Femap V2022.1 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-609880.pdf

Restart Required: Yes

Instructions:

1. Download and install Simcenter Femap V2022.1 or later from Siemens support portal. 2. Uninstall previous vulnerable versions. 3. Restart system after installation.

🔧 Temporary Workarounds

Restrict NEU file handling

windows

Block or restrict opening of NEU files via application whitelisting or file extension policies.

User privilege reduction

windows

Run Femap with limited user privileges to reduce impact of successful exploitation.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized binaries
  • Educate users to avoid opening NEU files from untrusted sources and implement email filtering for suspicious attachments

🔍 How to Verify

Check if Vulnerable:

Check Femap version via Help > About; if version is V2020.2 or V2021.1, system is vulnerable.

Check Version:

Not applicable - check via GUI Help > About menu in Femap

Verify Fix Applied:

Verify installed version is V2022.1 or later via Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when parsing NEU files
  • Unexpected process creation from femap.exe

Network Indicators:

  • Unusual outbound connections from Femap process

SIEM Query:

Process Creation where Image contains 'femap.exe' AND ParentImage NOT IN ('explorer.exe', 'cmd.exe')

🔗 References

📤 Share & Export