CVE-2021-46161

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted NEU files in Simcenter Femap engineering software. Attackers can exploit an out-of-bounds write vulnerability to execute arbitrary code with the privileges of the current user. Organizations using affected Simcenter Femap versions for engineering analysis are at risk.

💻 Affected Systems

Products:
  • Simcenter Femap
Versions: V2020.2 (All versions), V2021.1 (All versions)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing malicious NEU files, which are native Femap format files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution leading to data theft, lateral movement, or ransomware deployment.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to engineering data and system resources.

🟢

If Mitigated

Limited impact if proper file validation and least privilege principles are enforced.

🌐 Internet-Facing: LOW - This requires file parsing, typically not an internet-facing service.
🏢 Internal Only: HIGH - Engineering workstations often process external files and have elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious file. No public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to V2022.1 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-609880.pdf

Restart Required: Yes

Instructions:

1. Download latest Simcenter Femap version from Siemens support portal. 2. Install update following vendor instructions. 3. Restart affected systems.

🔧 Temporary Workarounds

Restrict NEU file processing

windows

Block or restrict processing of NEU files from untrusted sources

Run with reduced privileges

windows

Run Femap with standard user privileges instead of administrative rights

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use network segmentation to isolate engineering workstations from critical systems

🔍 How to Verify

Check if Vulnerable:

Check Femap version via Help > About menu. Vulnerable if version is 2020.2.x or 2021.1.x.

Check Version:

Not applicable - check via GUI Help > About menu

Verify Fix Applied:

Verify version is 2022.1 or later in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of femap.exe
  • Suspicious file parsing errors in application logs

Network Indicators:

  • Unusual outbound connections from engineering workstations

SIEM Query:

Process: femap.exe AND (EventID: 1000 OR EventID: 1001) OR File: *.neu from untrusted sources

🔗 References

📤 Share & Export