CVE-2023-37375

7.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Tecnomatix Plant Simulation allows attackers to execute arbitrary code by tricking users into opening malicious SPP files. This affects all versions of Plant Simulation V2201 before V2201.0008 and V2302 before V2302.0002. Users who open untrusted SPP files are at risk.

💻 Affected Systems

Products:
  • Tecnomatix Plant Simulation V2201
  • Tecnomatix Plant Simulation V2302
Versions: V2201: All versions < V2201.0008, V2302: All versions < V2302.0002
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing specially crafted SPP files. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the Plant Simulation process, potentially leading to lateral movement, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or remote code execution when users open malicious SPP files, potentially leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact with proper user training and file validation, potentially causing application crashes but no code execution.

🌐 Internet-Facing: LOW - Exploitation requires user interaction with malicious files, not directly network-exposed.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, but requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious SPP file. No authentication bypass needed but requires social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2201.0008 for V2201, V2302.0002 for V2302

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf

Restart Required: Yes

Instructions:

1. Download the update from Siemens support portal. 2. Install the update following Siemens installation guide. 3. Restart the system. 4. Verify version is updated.

🔧 Temporary Workarounds

Restrict SPP file handling

windows

Configure Windows to open SPP files with a different application or block them entirely

Use Windows Group Policy to modify file associations for .spp files

User awareness training

all

Train users to only open SPP files from trusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use endpoint detection and response (EDR) to monitor for suspicious process creation

🔍 How to Verify

Check if Vulnerable:

Check Plant Simulation version in Help > About. If version is V2201 < 0008 or V2302 < 0002, system is vulnerable.

Check Version:

Check Help > About in Plant Simulation application

Verify Fix Applied:

Verify version shows V2201.0008 or V2302.0002 in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening SPP files
  • Unusual process creation from Plant Simulation

Network Indicators:

  • Outbound connections from Plant Simulation to unknown IPs

SIEM Query:

Process Creation where Image contains 'PlantSim' AND CommandLine contains '.spp'

🔗 References

📤 Share & Export