CVE-2023-39549

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in Solid Edge SE2023 allows attackers to execute arbitrary code by tricking users into opening malicious DWG files. This affects all versions before V223.0 Update 2. Users who open untrusted DWG files are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Solid Edge SE2023
Versions: All versions < V223.0 Update 2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when parsing DWG files, so any configuration that opens DWG files is affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with the same privileges as the Solid Edge process, potentially leading to ransomware deployment, data theft, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact if proper application sandboxing, least privilege principles, and file validation are implemented, potentially containing the exploit to the application context.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious file) and knowledge of the specific use-after-free condition in DWG parsing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V223.0 Update 2

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-932528.pdf

Restart Required: Yes

Instructions:

1. Open Solid Edge SE2023
2. Navigate to Help > Check for Updates
3. Install V223.0 Update 2
4. Restart the application

🔧 Temporary Workarounds

Restrict DWG file handling

windows

Configure Windows to open DWG files with a different application or block them entirely

Use Group Policy or registry to modify file associations

Application sandboxing

windows

Run Solid Edge with reduced privileges using application control solutions

🧯 If You Can't Patch

  • Implement strict file validation policies to block untrusted DWG files
  • Use network segmentation to isolate systems running vulnerable versions

🔍 How to Verify

Check if Vulnerable:

Check Solid Edge version in Help > About. If version is below V223.0 Update 2, the system is vulnerable.

Check Version:

Not applicable - check through application GUI

Verify Fix Applied:

Verify version is V223.0 Update 2 or higher in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening DWG files
  • Unusual process creation from Solid Edge executable

Network Indicators:

  • Outbound connections from Solid Edge process to unexpected destinations

SIEM Query:

Process creation where parent_process contains 'Solid Edge' AND (process_name contains 'cmd.exe' OR process_name contains 'powershell.exe')

🔗 References

📤 Share & Export