CVE-2023-39185

7.8 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in Solid Edge SE2023 allows attackers to execute arbitrary code by tricking users into opening malicious PAR files. This affects all Solid Edge SE2023 users running versions before V223.0 Update 7. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Solid Edge SE2023
Versions: All versions < V223.0 Update 7
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when parsing specially crafted PAR files, which are Solid Edge assembly files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the Solid Edge process, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or remote code execution when users open malicious PAR files, leading to malware installation or data exfiltration.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially causing application crashes but not system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious files. No public exploits have been reported as of current knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V223.0 Update 7

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf

Restart Required: Yes

Instructions:

1. Download Solid Edge SE2023 V223.0 Update 7 from Siemens support portal. 2. Close all Solid Edge applications. 3. Run the update installer with administrative privileges. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Block PAR file execution

windows

Prevent Solid Edge from opening PAR files via group policy or application restrictions

Use Windows Group Policy to block .PAR file associations with Solid Edge

User awareness training

all

Train users not to open PAR files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized Solid Edge execution
  • Restrict user privileges to limit potential damage from exploitation

🔍 How to Verify

Check if Vulnerable:

Check Solid Edge version in Help > About Solid Edge. If version is below V223.0 Update 7, system is vulnerable.

Check Version:

In Solid Edge: Help > About Solid Edge

Verify Fix Applied:

Verify version shows V223.0 Update 7 or higher in Help > About Solid Edge after patching.

📡 Detection & Monitoring

Log Indicators:

  • Solid Edge crash logs with memory access violations
  • Windows Event Logs showing Solid Edge process termination

Network Indicators:

  • Unusual outbound connections from Solid Edge process
  • File downloads of PAR files from untrusted sources

SIEM Query:

Process: 'sedge.exe' AND (EventID: 1000 OR EventID: 1001) AND Message: 'access violation'

🔗 References

📤 Share & Export