CVE-2021-46155

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution via a stack-based buffer overflow when parsing NEU files in Simcenter Femap. Attackers can execute arbitrary code with the privileges of the current process. Affects all versions of Simcenter Femap V2020.2 and V2021.1.

💻 Affected Systems

Products:
  • Simcenter Femap
Versions: V2020.2 (All versions), V2021.1 (All versions)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the NEU file parser component of Femap.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Femap process, potentially leading to data theft, lateral movement, or persistence.

🟠

Likely Case

Local privilege escalation or remote code execution if user opens a malicious NEU file, resulting in system compromise.

🟢

If Mitigated

Limited impact if file execution is restricted and proper security controls prevent malicious file execution.

🌐 Internet-Facing: LOW - This requires user interaction to open a malicious file, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Risk exists when users open NEU files from untrusted sources within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user to open a specially crafted NEU file. Multiple ZDI advisories suggest this is a reliable vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to V2022.1 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-609880.pdf

Restart Required: Yes

Instructions:

1. Download latest Femap version from Siemens support portal. 2. Install the update following vendor instructions. 3. Restart system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict NEU file execution

windows

Block execution of NEU files from untrusted sources using application whitelisting or file restrictions.

User awareness training

all

Train users not to open NEU files from unknown or untrusted sources.

🧯 If You Can't Patch

  • Implement application whitelisting to restrict which applications can open NEU files
  • Use network segmentation to isolate Femap systems from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check Femap version via Help > About. If version is V2020.2 or V2021.1, system is vulnerable.

Check Version:

In Femap: Help > About menu option

Verify Fix Applied:

Verify Femap version is V2022.1 or later after update installation.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of femap.exe
  • Unusual file access patterns to NEU files

Network Indicators:

  • Unusual outbound connections from Femap process

SIEM Query:

Process: femap.exe AND (EventID: 1000 OR EventID: 1001) OR FileAccess: *.neu from untrusted sources

🔗 References

📤 Share & Export