CVE-2023-24556

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted PAR files in Solid Edge CAD software. Attackers can exploit an out-of-bounds read vulnerability to execute arbitrary code in the context of the current process. Users of Solid Edge SE2022 and SE2023 are affected.

💻 Affected Systems

Products:
  • Solid Edge SE2022
  • Solid Edge SE2023
Versions: All versions before V222.0MP12 for SE2022, all versions before V223.0Update2 for SE2023
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with default configurations. PAR files are proprietary Solid Edge part files used in CAD workflows.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the Solid Edge process, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or arbitrary code execution when a user opens a malicious PAR file, potentially leading to data exfiltration or malware installation.

🟢

If Mitigated

Limited impact if proper application sandboxing and least privilege principles are implemented, though file parsing vulnerabilities remain dangerous.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires user interaction (opening a file), PAR files could be distributed via email or web downloads.
🏢 Internal Only: HIGH - In engineering environments, PAR files are commonly shared internally, making this a significant threat vector.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious PAR file. The vulnerability is in file parsing logic, making reliable exploitation non-trivial but feasible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V222.0MP12 for SE2022, V223.0Update2 for SE2023

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf

Restart Required: Yes

Instructions:

1. Download the latest update from Siemens Solid Edge support portal. 2. Run the installer with administrative privileges. 3. Restart the system after installation completes. 4. Verify the version matches the patched version.

🔧 Temporary Workarounds

Block PAR file extensions

windows

Prevent execution of PAR files via group policy or application control

Using Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: *.par = Disallowed

User awareness training

all

Educate users to only open PAR files from trusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized Solid Edge execution
  • Run Solid Edge with reduced privileges using application sandboxing or restricted user accounts

🔍 How to Verify

Check if Vulnerable:

Check Solid Edge version via Help > About Solid Edge. If version is below V222.0MP12 (SE2022) or V223.0Update2 (SE2023), the system is vulnerable.

Check Version:

In Solid Edge: Help > About Solid Edge, or check registry: HKEY_LOCAL_MACHINE\SOFTWARE\Siemens\Solid Edge

Verify Fix Applied:

Verify the version matches or exceeds the patched versions. Test with known safe PAR files to ensure normal functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in Solid Edge when opening PAR files
  • Unexpected process creation from sedge.exe
  • File access to suspicious PAR files from network locations

Network Indicators:

  • Downloads of PAR files from untrusted sources
  • Unusual outbound connections from Solid Edge process

SIEM Query:

Process Creation: ParentImage="*\sedge.exe" AND (CommandLine CONTAINS "*.par" OR Image="*\cmd.exe" OR Image="*\powershell.exe")

🔗 References

📤 Share & Export