CVE-2023-38680

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted SPP files in Tecnomatix Plant Simulation. Attackers can exploit an out-of-bounds write buffer overflow to execute arbitrary code with the privileges of the current process. All users of affected Tecnomatix Plant Simulation versions are vulnerable.

💻 Affected Systems

Products:
  • Tecnomatix Plant Simulation
Versions: V2201 (All versions < V2201.0008), V2302 (All versions < V2302.0002)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when parsing SPP files, which are native project files for Plant Simulation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Remote code execution leading to installation of malware, data exfiltration, or disruption of manufacturing/industrial processes.

🟢

If Mitigated

Limited impact with proper network segmentation and file validation controls preventing malicious SPP files from reaching vulnerable systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious SPP file, but no authentication is needed once the file is processed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2201.0008 for V2201, V2302.0002 for V2302

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf

Restart Required: Yes

Instructions:

1. Download the latest update from Siemens support portal. 2. Install the update following Siemens installation procedures. 3. Restart the application and any related services.

🔧 Temporary Workarounds

Restrict SPP file handling

windows

Implement application whitelisting to prevent execution of Plant Simulation from untrusted locations and restrict SPP file handling.

User awareness training

all

Train users to only open SPP files from trusted sources and verify file integrity before opening.

🧯 If You Can't Patch

  • Implement network segmentation to isolate Plant Simulation systems from critical networks
  • Deploy application control solutions to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check Plant Simulation version in Help > About menu. If version is V2201 < 0008 or V2302 < 0002, system is vulnerable.

Check Version:

Not applicable - check via application GUI Help > About menu

Verify Fix Applied:

After patching, verify version shows V2201.0008 or V2302.0002 in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening SPP files
  • Unusual process creation from Plant Simulation executable

Network Indicators:

  • Unexpected outbound connections from Plant Simulation systems

SIEM Query:

Process creation where parent_process contains 'PlantSim' AND (process_name contains 'cmd.exe' OR process_name contains 'powershell.exe')

🔗 References

📤 Share & Export