CVE-2022-28661

8.8 HIGH

📋 TL;DR

This vulnerability in Simcenter Femap allows remote code execution via specially crafted .NEU files due to an out-of-bounds read. It affects all versions before V2022.1.2, potentially enabling attackers to run arbitrary code within the current process context. Users of Simcenter Femap for engineering simulation are at risk if they open malicious files.

💻 Affected Systems

Products:
  • Simcenter Femap
Versions: All versions < V2022.1.2
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered by parsing .NEU files, which are used for engineering data exchange; default installations are susceptible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution, leading to data theft, system manipulation, or lateral movement within the network.

🟠

Likely Case

Local code execution when a user opens a malicious .NEU file, resulting in malware installation or data exfiltration.

🟢

If Mitigated

Limited impact if file execution is restricted or the application is sandboxed, but potential for process crashes or information disclosure remains.

🌐 Internet-Facing: LOW, as exploitation typically requires user interaction to open a file, not direct internet exposure.
🏢 Internal Only: MEDIUM, due to the need for file sharing or social engineering within internal networks to trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting a malicious .NEU file and convincing a user to open it; no public proof-of-concept is known, but the vulnerability is documented by ZDI.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2022.1.2 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-998762.pdf

Restart Required: Yes

Instructions:

1. Download the latest version from Siemens support. 2. Install the update following vendor instructions. 3. Restart the application and any related services.

🔧 Temporary Workarounds

Restrict .NEU file handling

all

Block or limit access to .NEU files from untrusted sources to prevent exploitation.

Use application sandboxing

all

Run Simcenter Femap in a sandboxed or isolated environment to contain potential code execution.

🧯 If You Can't Patch

  • Implement strict access controls to prevent untrusted .NEU files from being opened by users.
  • Monitor for unusual process activity or file accesses related to Simcenter Femap to detect potential exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Simcenter Femap; if it is below V2022.1.2, it is vulnerable.

Check Version:

Launch Simcenter Femap and check the version in the 'Help' > 'About' menu or use vendor-specific command-line tools if available.

Verify Fix Applied:

Verify that the version is V2022.1.2 or higher after applying the patch.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes or errors in Simcenter Femap logs when processing .NEU files
  • Unusual process creation or file access events from the Femap executable

Network Indicators:

  • File transfers of .NEU files from untrusted sources to internal systems

SIEM Query:

Example: 'process_name:"femap.exe" AND event_type:"process_crash" OR file_extension:".neu" AND source_ip:external'

🔗 References

📤 Share & Export