CVE-2023-24562

7.8 HIGH

📋 TL;DR

This vulnerability in Solid Edge CAD software allows attackers to execute arbitrary code by exploiting uninitialized pointer access when processing malicious PAR files. Users of Solid Edge SE2022 and SE2023 before specific updates are affected. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Solid Edge SE2022
  • Solid Edge SE2023
Versions: Solid Edge SE2022: All versions before V222.0MP12; Solid Edge SE2023: All versions before V223.0Update2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction to open malicious PAR files. No specific configuration makes systems immune.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the Solid Edge process, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or remote code execution when a user opens a malicious PAR file, leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially containing the exploit to the Solid Edge process only.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious PAR files. No public exploit code is available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Solid Edge SE2022: V222.0MP12 or later; Solid Edge SE2023: V223.0Update2 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf

Restart Required: Yes

Instructions:

1. Download the latest update from Siemens support portal. 2. Close all Solid Edge applications. 3. Run the update installer with administrative privileges. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Block PAR file extensions

windows

Prevent Solid Edge from opening PAR files via group policy or application restrictions

Not applicable - configure via Group Policy or application whitelisting

User awareness training

all

Educate users to avoid opening PAR files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to restrict execution of Solid Edge to trusted locations only
  • Use endpoint protection with behavior monitoring to detect and block suspicious Solid Edge process activities

🔍 How to Verify

Check if Vulnerable:

Check Solid Edge version via Help > About Solid Edge. If version is below V222.0MP12 for SE2022 or below V223.0Update2 for SE2023, the system is vulnerable.

Check Version:

In Solid Edge: Help > About Solid Edge

Verify Fix Applied:

Verify Solid Edge version is V222.0MP12 or later for SE2022, or V223.0Update2 or later for SE2023 via Help > About Solid Edge.

📡 Detection & Monitoring

Log Indicators:

  • Solid Edge crash logs with memory access violations
  • Windows Event Logs showing Solid Edge process spawning unexpected child processes

Network Indicators:

  • Unusual outbound connections from Solid Edge process to external IPs
  • DNS queries for suspicious domains from Solid Edge host

SIEM Query:

Process Creation where Parent Process Name contains 'solidedge.exe' AND (Command Line contains '.par' OR Image contains suspicious strings)

🔗 References

📤 Share & Export