CVE-2023-24550

7.8 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in Solid Edge allows attackers to execute arbitrary code by tricking users into opening malicious PAR files. This affects Solid Edge SE2022 and SE2023 users who haven't applied security updates. The vulnerability enables remote code execution within the current process context.

💻 Affected Systems

Products:
  • Solid Edge SE2022
  • Solid Edge SE2023
Versions: SE2022: All versions before V222.0MP12, SE2023: All versions before V223.0Update2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in PAR file parsing functionality; exploitation requires user interaction to open malicious files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through remote code execution, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware execution when users open malicious PAR files, potentially leading to credential theft or data exfiltration.

🟢

If Mitigated

Limited impact with proper application whitelisting and user training preventing execution of malicious files.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious PAR files; no public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SE2022: V222.0MP12 or later, SE2023: V223.0Update2 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf

Restart Required: Yes

Instructions:

1. Download latest Solid Edge updates from Siemens support portal. 2. Install updates following vendor instructions. 3. Restart affected systems. 4. Verify version is patched.

🔧 Temporary Workarounds

Block PAR file extensions

windows

Prevent execution of PAR files via group policy or application control

Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: *.PAR = Disallowed

User awareness training

all

Train users not to open PAR files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to block Solid Edge execution
  • Network segmentation to isolate Solid Edge workstations

🔍 How to Verify

Check if Vulnerable:

Check Solid Edge version via Help > About Solid Edge

Check Version:

In Solid Edge: Help > About Solid Edge

Verify Fix Applied:

Verify version is SE2022 V222.0MP12+ or SE2023 V223.0Update2+

📡 Detection & Monitoring

Log Indicators:

  • Solid Edge crash logs with heap corruption errors
  • Windows Application logs showing Solid Edge crashes

Network Indicators:

  • Unexpected PAR file downloads to engineering workstations
  • Outbound connections from Solid Edge to unknown IPs

SIEM Query:

source="Windows Security" EventID=4688 ProcessName="*SolidEdge*.exe" CommandLine="*.PAR"

🔗 References

📤 Share & Export