CVE-2023-24991

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted SPP files in Tecnomatix Plant Simulation. Attackers can exploit an out-of-bounds write buffer overflow to execute arbitrary code with the privileges of the current process. All users of Tecnomatix Plant Simulation versions before V2201.0006 are affected.

💻 Affected Systems

Products:
  • Tecnomatix Plant Simulation
Versions: All versions < V2201.0006
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing specially crafted SPP files. Requires user interaction to open malicious files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or remote code execution when users open malicious SPP files, potentially leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact with proper file validation and user awareness preventing malicious file execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user to open a malicious SPP file. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2201.0006

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf

Restart Required: Yes

Instructions:

1. Download update V2201.0006 from Siemens support portal. 2. Backup current installation. 3. Run installer with administrative privileges. 4. Restart system after installation completes.

🔧 Temporary Workarounds

Restrict SPP file execution

windows

Block execution of SPP files from untrusted sources using application whitelisting or file restrictions.

User awareness training

all

Train users to only open SPP files from trusted sources and verify file integrity before opening.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of Plant Simulation from untrusted locations
  • Use network segmentation to isolate Plant Simulation systems from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check Plant Simulation version in Help > About. If version is below V2201.0006, system is vulnerable.

Check Version:

Not applicable - check through application GUI Help > About menu

Verify Fix Applied:

Verify version shows V2201.0006 or higher in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Plant Simulation executable
  • Multiple failed file parsing attempts
  • Memory access violations in application logs

Network Indicators:

  • Unexpected outbound connections from Plant Simulation process
  • File downloads to Plant Simulation systems from untrusted sources

SIEM Query:

Process creation where parent_process contains 'plantsim' AND (process contains 'cmd.exe' OR process contains 'powershell.exe')

🔗 References

📤 Share & Export