CVE-2023-25140

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted PAR files in Siemens Parasolid and Solid Edge software. An attacker can exploit an out-of-bounds read vulnerability to execute arbitrary code in the context of the current process. Affected users include those running vulnerable versions of Parasolid V34.0, V34.1, V35.0, V35.1, and Solid Edge SE2022.

💻 Affected Systems

Products:
  • Parasolid
  • Solid Edge SE2022
Versions: Parasolid V34.0 (< V34.0.254), V34.1 (< V34.1.242), V35.0 (< V35.0.170), V35.1 (< V35.1.150), Solid Edge SE2022 (< V222.0MP12)
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable when processing PAR files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through remote code execution, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Application crash or denial of service, with potential for limited code execution depending on exploit sophistication.

🟢

If Mitigated

No impact if proper file validation and patching are implemented.

🌐 Internet-Facing: MEDIUM - Requires user to open malicious PAR files, but could be delivered via email or web downloads.
🏢 Internal Only: HIGH - Internal users frequently exchange PAR files in engineering workflows, increasing exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious PAR files. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Parasolid V34.0.254, V34.1.242, V35.0.170, V35.1.150, Solid Edge SE2022 V222.0MP12

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf

Restart Required: Yes

Instructions:

1. Download latest patches from Siemens support portal. 2. Apply patches to affected Parasolid/Solid Edge installations. 3. Restart affected systems. 4. Verify version updates.

🔧 Temporary Workarounds

Restrict PAR file processing

all

Block or restrict processing of PAR files from untrusted sources

Application sandboxing

all

Run Parasolid/Solid Edge in restricted environments

🧯 If You Can't Patch

  • Implement strict file validation for PAR files before processing
  • Use application whitelisting to prevent unauthorized execution

🔍 How to Verify

Check if Vulnerable:

Check installed version against affected version ranges in Parasolid/Solid Edge about dialog

Check Version:

Check application about dialog or use vendor-specific version query tools

Verify Fix Applied:

Confirm version is equal to or greater than patched versions: V34.0.254, V34.1.242, V35.0.170, V35.1.150, or V222.0MP12

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing PAR files
  • Unexpected process creation from Parasolid/Solid Edge

Network Indicators:

  • Downloads of PAR files from untrusted sources

SIEM Query:

Process creation events from parasolid.exe or solid edge executables with suspicious parent processes

🔗 References

📤 Share & Export