CVE-2023-30986

7.8 HIGH

📋 TL;DR

A memory corruption vulnerability in Solid Edge SE2023 allows attackers to execute arbitrary code by tricking users into opening malicious STP files. This affects all Solid Edge SE2023 versions before V223.0 Update 3. Users who open untrusted STP files are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Solid Edge SE2023
Versions: All versions < V223.0 Update 3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to open a malicious STP file. No special configuration needed to be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining the same privileges as the Solid Edge process, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash but no code execution.

🌐 Internet-Facing: LOW - This requires user interaction to open malicious files, making direct internet exploitation unlikely without social engineering.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared network drives containing malicious STP files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious file. Memory corruption vulnerabilities typically require some expertise to weaponize reliably.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V223.0 Update 3

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-932528.pdf

Restart Required: Yes

Instructions:

1. Download Solid Edge SE2023 V223.0 Update 3 from Siemens support portal. 2. Close all Solid Edge applications. 3. Run the update installer with administrative privileges. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Block STP file extensions

windows

Prevent Solid Edge from opening STP files via group policy or application restrictions

Using Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: Path: *.stp, Security Level: Disallowed

Disable STP file association

windows

Remove STP file type association with Solid Edge

reg delete "HKEY_CLASSES_ROOT\.stp" /f
reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.stp" /f

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized Solid Edge execution
  • Restrict user privileges to standard user accounts without administrative rights

🔍 How to Verify

Check if Vulnerable:

Check Solid Edge version via Help > About Solid Edge. If version is earlier than V223.0 Update 3, the system is vulnerable.

Check Version:

In Solid Edge: Help > About Solid Edge

Verify Fix Applied:

Verify version shows V223.0 Update 3 or later in Help > About Solid Edge.

📡 Detection & Monitoring

Log Indicators:

  • Solid Edge crash logs with memory access violations
  • Windows Application Event Logs with Faulting Module: Solid Edge executable

Network Indicators:

  • Unusual outbound connections from Solid Edge process
  • File downloads of STP files from untrusted sources

SIEM Query:

EventID=1000 AND Source="Application Error" AND ProcessName="*Solid Edge*" AND FaultingModule="*Solid Edge*"

🔗 References

📤 Share & Export