CVE-2023-24995

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution via specially crafted SPP files in Tecnomatix Plant Simulation. Attackers can exploit an out-of-bounds write buffer overflow to execute arbitrary code with the privileges of the current process. All users of Tecnomatix Plant Simulation versions before V2201.0006 are affected.

💻 Affected Systems

Products:
  • Tecnomatix Plant Simulation
Versions: All versions < V2201.0006
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when parsing SPP files, which are the native file format for Plant Simulation projects.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Remote code execution allowing attackers to install malware, exfiltrate sensitive engineering data, or disrupt manufacturing operations.

🟢

If Mitigated

Limited impact with proper network segmentation and file validation controls preventing malicious SPP files from reaching vulnerable systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious SPP file, but no authentication is needed once the file is accessed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2201.0006

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf

Restart Required: Yes

Instructions:

1. Download the update from Siemens support portal
2. Backup existing Plant Simulation projects
3. Close all Plant Simulation instances
4. Run the installer for V2201.0006 or later
5. Restart the system

🔧 Temporary Workarounds

Restrict SPP file handling

windows

Block or restrict opening of SPP files from untrusted sources

Application whitelisting

windows

Implement application control to prevent execution of unauthorized code

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Plant Simulation systems
  • Use email/web gateways to block SPP file attachments from untrusted sources
  • Train users to only open SPP files from trusted sources
  • Monitor for suspicious process creation from Plant Simulation

🔍 How to Verify

Check if Vulnerable:

Check Plant Simulation version via Help > About menu or registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Siemens\Plant Simulation\Version

Check Version:

reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Siemens\Plant Simulation" /v Version

Verify Fix Applied:

Verify version is V2201.0006 or higher in Help > About menu

📡 Detection & Monitoring

Log Indicators:

  • Multiple crash reports from Plant Simulation
  • Unexpected process creation from Plant Simulation executable
  • Failed file parsing attempts in application logs

Network Indicators:

  • Unusual outbound connections from Plant Simulation systems
  • SPP file downloads from suspicious sources

SIEM Query:

Process Creation where Image contains "PlantSimulation" AND CommandLine contains suspicious patterns

🔗 References

📤 Share & Export