CVE-2023-24554
📋 TL;DR
This vulnerability allows attackers to execute arbitrary code by exploiting an out-of-bounds read vulnerability in Solid Edge's PAR file parser. Attackers can craft malicious PAR files that trigger memory corruption when opened by affected Solid Edge versions. Users of Solid Edge SE2022 and SE2023 before specific updates are vulnerable.
💻 Affected Systems
- Solid Edge SE2022
- Solid Edge SE2023
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through remote code execution, potentially leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Local privilege escalation or arbitrary code execution when a user opens a malicious PAR file, potentially leading to malware installation or data exfiltration.
If Mitigated
Limited impact with proper application whitelisting and user training preventing execution of untrusted files.
🎯 Exploit Status
Exploitation requires user interaction to open malicious PAR files; no public exploit code is currently available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: SE2022: V222.0MP12 or later, SE2023: V223.0Update2 or later
Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
Restart Required: Yes
Instructions:
1. Download the latest update from Siemens support portal. 2. Close all Solid Edge applications. 3. Run the update installer with administrative privileges. 4. Restart the system after installation completes.
🔧 Temporary Workarounds
Block PAR file extensions
windowsPrevent execution of PAR files via group policy or application control
Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: *.PAR = Disallowed
Disable PAR file association
windowsRemove Solid Edge as default handler for PAR files
reg delete "HKEY_CLASSES_ROOT\.par" /f
assoc .par=
🧯 If You Can't Patch
- Implement application whitelisting to block untrusted Solid Edge instances
- Educate users to never open PAR files from untrusted sources
🔍 How to Verify
Check if Vulnerable:
Check Solid Edge version via Help > About Solid Edge; compare against vulnerable versions.
Check Version:
wmic product where "name like 'Solid Edge%'" get version
Verify Fix Applied:
Verify version is SE2022 V222.0MP12+ or SE2023 V223.0Update2+ in Help > About Solid Edge.
📡 Detection & Monitoring
Log Indicators:
- Solid Edge crash logs with memory access violations
- Windows Application logs with Faulting Module: sgedge*.dll
Network Indicators:
- Unusual outbound connections from Solid Edge process
- PAR file downloads from untrusted sources
SIEM Query:
source="windows" AND (event_id=1000 OR event_id=1001) AND process_name="sedge.exe" AND faulting_module="sgedge*.dll"