CVE-2023-39187

7.8 HIGH

📋 TL;DR

This vulnerability in Solid Edge SE2023 allows attackers to execute arbitrary code by exploiting an out-of-bounds read when parsing malicious DFT files. Users who open specially crafted DFT files with vulnerable versions of Solid Edge are affected. The attack occurs within the current process context, potentially compromising the system.

💻 Affected Systems

Products:
  • Solid Edge SE2023
Versions: All versions before V223.0 Update 7
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where Solid Edge is installed and users open DFT files. DFT files are typically engineering drawing files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through remote code execution leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or system compromise when a user opens a malicious DFT file, potentially leading to data exfiltration or malware installation.

🟢

If Mitigated

Limited impact with proper application sandboxing, file validation, and user awareness preventing malicious file execution.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: MEDIUM with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious DFT file. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V223.0 Update 7 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf

Restart Required: Yes

Instructions:

1. Download Solid Edge SE2023 V223.0 Update 7 or later from Siemens support portal
2. Run the installer with administrative privileges
3. Restart the system after installation completes
4. Verify the update was applied successfully

🔧 Temporary Workarounds

Block DFT file extensions

windows

Prevent DFT files from being opened by Solid Edge through file association changes or application control policies

User awareness training

all

Train users to only open DFT files from trusted sources and verify file integrity

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized Solid Edge execution
  • Use network segmentation to isolate engineering workstations from critical systems

🔍 How to Verify

Check if Vulnerable:

Check Solid Edge version in Help > About. If version is earlier than V223.0 Update 7, the system is vulnerable.

Check Version:

Not applicable - check via Solid Edge GUI Help > About menu

Verify Fix Applied:

Verify Solid Edge version shows V223.0 Update 7 or later in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Solid Edge crash logs with memory access violations
  • Unexpected process creation from Solid Edge
  • Multiple failed DFT file parsing attempts

Network Indicators:

  • Unusual outbound connections from engineering workstations
  • DFT file downloads from untrusted sources

SIEM Query:

Process creation events where parent process is 'sedge.exe' followed by suspicious child processes

🔗 References

📤 Share & Export