CVE-2023-37248

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through an out-of-bounds write buffer overflow when parsing malicious PAR files in Tecnomatix Plant Simulation. Attackers can execute arbitrary code with the privileges of the current process. All users of affected versions are vulnerable.

💻 Affected Systems

Products:
  • Tecnomatix Plant Simulation V2201
  • Tecnomatix Plant Simulation V2302
Versions: V2201 (All versions < V2201.0008), V2302 (All versions < V2302.0002)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the PAR file parser; any configuration that processes PAR files is affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or remote code execution leading to data exfiltration, system disruption, or installation of persistent malware.

🟢

If Mitigated

Limited impact with proper network segmentation and file validation, potentially resulting in application crash without code execution.

🌐 Internet-Facing: MEDIUM - While exploitation requires file parsing, internet-facing systems accepting PAR files could be targeted.
🏢 Internal Only: HIGH - Internal users could exploit this through malicious PAR files, especially in engineering/manufacturing environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting a malicious PAR file and convincing a user to open it or placing it where the application will process it automatically.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2201.0008 for V2201, V2302.0002 for V2302

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Siemens support portal. 2. Close all Plant Simulation instances. 3. Run the installer with administrative privileges. 4. Restart the system.

🔧 Temporary Workarounds

Restrict PAR file processing

windows

Block or restrict processing of PAR files through application settings or group policies.

User awareness training

all

Train users not to open PAR files from untrusted sources.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use network segmentation to isolate Plant Simulation systems from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check Plant Simulation version in Help > About. If version is V2201 below 0008 or V2302 below 0002, system is vulnerable.

Check Version:

In Plant Simulation: Help > About menu option

Verify Fix Applied:

Verify version shows V2201.0008 or higher, or V2302.0002 or higher after patching.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing PAR files
  • Unexpected process creation from Plant Simulation

Network Indicators:

  • Unusual outbound connections from Plant Simulation process

SIEM Query:

Process Creation where Parent Process contains 'PlantSim' AND Command Line contains suspicious patterns

🔗 References

📤 Share & Export