CVE-2023-37246

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by exploiting a heap-based buffer overflow when parsing malicious PRT files in Tecnomatix Plant Simulation. Affected users include anyone running vulnerable versions of Tecnomatix Plant Simulation V2201 or V2302 who opens untrusted PRT files.

💻 Affected Systems

Products:
  • Tecnomatix Plant Simulation V2201
  • Tecnomatix Plant Simulation V2302
Versions: V2201: All versions < V2201.0008, V2302: All versions < V2302.0002
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing PRT files, which are native to Plant Simulation. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the Plant Simulation process, potentially leading to data theft, system manipulation, or lateral movement within the network.

🟠

Likely Case

Local code execution with user-level privileges when a user opens a malicious PRT file, potentially leading to malware installation or data exfiltration.

🟢

If Mitigated

No impact if users only open trusted PRT files from verified sources and the application runs with minimal privileges.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious PRT file. Heap-based buffer overflows typically require more sophisticated exploitation than stack-based overflows.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2201.0008 for V2201, V2302.0002 for V2302

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf

Restart Required: Yes

Instructions:

1. Download the appropriate update from Siemens support portal. 2. Close all Plant Simulation instances. 3. Run the installer with administrative privileges. 4. Restart the system if prompted.

🔧 Temporary Workarounds

Restrict PRT file handling

windows

Configure system to open PRT files only with trusted applications and block execution from untrusted sources.

Run with reduced privileges

windows

Configure Plant Simulation to run with standard user privileges instead of administrative rights.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Educate users to never open PRT files from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check Plant Simulation version via Help > About menu or examine installed programs in Control Panel.

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Verify version number matches patched versions (V2201.0008 or V2302.0002) in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening PRT files
  • Unusual process creation from Plant Simulation

Network Indicators:

  • Outbound connections from Plant Simulation to unexpected destinations

SIEM Query:

Process:PlantSimulation.exe AND (EventID:1000 OR EventID:1001)

🔗 References

📤 Share & Export